Advertisement
Blogs
Subscribe to DFI News

The Lead

The Obama Administration has revealed that an unclassified computer network used by the US government was infiltrated by hackers.

Hackers Infiltrate White House Network

October 29, 2014 | by Charlie Osborne | Comments

The Obama Administration has revealed that an unclassified computer network used by the US government was infiltrated by hackers.                                   

TOPICS:
View Sample

SUBSCRIBE TO FREE
DFI News
EMAIL NEWSLETTER

 CurrentC, a merchant-backed mobile payment system in development to rival   Google Wallet and Apple Pay, has been hacked during its pilot phase.

Apple Pay Rival CurrentC Hacked

October 30, 2014 11:24 am | by Charlie Osborne | Comments

CurrentC, a merchant-backed mobile payment system in development to rival Google Wallet and Apple Pay, has been hacked during its pilot phase.                               

TOPICS:
What began as a scheme to defraud office supply stores has evolved into more ambitious crimes that have cost retailers around the country millions of dollars—and the Nigerian cyber criminals behind the fraud have also turned at-home Internet users into un

Purchase Order Scam Leaves Trail of Victims

October 28, 2014 11:49 am | by Editor | Comments

What began as a scheme to defraud office supply stores has evolved into more ambitious crimes that have cost retailers around the country millions of dollars — and the Nigerian cyber criminals behind the fraud have also turned at-home Internet users into unsuspecting accomplices.

TOPICS:
The US Senate has a few privacy-related questions it would like to ask the people in charge at Whisper, the self-proclaimed "safest place on the internet."

US Senate Calls Whisper In for Serious Questioning on User Tracking

October 27, 2014 11:33 am | by Lisa Vaas | Comments

The U.S. Senate has a few privacy-related questions it would like to ask the people in charge at Whisper, the self-proclaimed "safest place on the internet."                           

TOPICS:
Advertisement
An odd new pattern of credit card fraud emanating from Brazil and targeting U.S. financial institutions could spell costly trouble for banks that are just beginning to issue customers more secure chip-based credit and debit cards.

'Replay' Attacks Spoof Chip Card Charges

October 27, 2014 10:26 am | by Editor | Comments

An odd new pattern of credit card fraud emanating from Brazil and targeting U.S. financial institutions could spell costly trouble for banks that are just beginning to issue customers more secure chip-based credit and debit cards.      

TOPICS:

Contact Opposing Counsel After Inadvertent Disclosure

October 24, 2014 9:53 am | by Joshua Gilliland, Esq. | Comments

What happens when a lawyer inadvertently produces an attorney protected by the attorney-client privilege? A Magistrate Judges and District Court Judge orders the receiving party to destroy the inadvertently produced email.  

TOPICS:

Four Ways Snowden Got it Wrong

October 23, 2014 11:29 am | by Dave Aitel | Comments

As a former ‘research scientist’ at the National Security Agency, I feel compelled to respond to James Bamford’s exclusive interview with Edward Snowden that appeared in the September issue of Wired magazine. Many of the factual assertions about the NSA and intelligence community that were included in Bamford’s article, and previous Snowden “disclosures,” are highly questionable.

TOPICS:

Timeline Analysis by Categories

October 22, 2014 11:24 am | by Corey Harrell | Comments

"Corey, at times our auditors find fraud and when they do sometimes they need help collecting and analyzing the data on the computers and network. Could you look into this digital forensic thing just in case if something comes up?" This simple request is what lead me into the digital forensic and incident response field. In this post I'm highlighting how this type of organization is applied to timeline analysis leveraging Plaso.

TOPICS:

Can You Ask the Court to Order a Party to Follow the Duty to Preserve?

October 21, 2014 8:52 am | by Joshua Gilliland, Esq. | Comments

There are no shortage of cases where the duty to preserve has gotten attorneys and parties a like in trouble. However, it is difficult to ask a Court to order a party to “follow the rules,” because the party already has a duty to so. However, if there is evidence of wrongdoing by the party that was subject to the duty to preserve, the outcome could be different.

TOPICS:
Advertisement

Can Apple Pay Thwart the Credit Card Hacking Trend?

October 20, 2014 11:27 am | by Evan Niu | Comments

Over the past year or so, we've seen some of the most pervasive and widespread credit card security breaches at many of the nation's largest retailers. With Apple's new Apple Pay service launching on Monday alongside a slew of security features, it comes at the perfect time.  

TOPICS:
Businesses of all sizes seem to be moving at least some operations to the cloud. It’s only a matter of time before you get a phone call asking you to conduct some kind of cloud forensics and/or incident response.

Forensics in the Amazon Cloud

October 17, 2014 10:19 am | by Editor | Comments

Businesses of all sizes seem to be moving at least some operations to the cloud. It’s only a matter of time before you get a phone call asking you to conduct some kind of cloud forensics and/or incident response.           

TOPICS:
The U.S. Justice Department has piled on more charges against alleged cybercrime kingpin Roman Seleznev, a Russian national who made headlines in July when it emerged that he’d been whisked away to Guam by U.S. federal agents while vacationing in the Mald

Seleznev Arrest Explains '2Pac' Downtime

October 16, 2014 11:03 am | by Editor | Comments

The U.S. Justice Department has piled on more charges against alleged cybercrime kingpin Roman Seleznev, a Russian national who made headlines in July when it emerged that he’d been whisked away to Guam by U.S. federal agents while vacationing in the Maldives.

TOPICS:
US-based game developer Brianna Wu was driven from her home over the weekend after a troll posted her address online and threatened to rape, kill and mutilate her. This situation came about because of the Gamergate controversy.

Another Game Developer Flees Her Home Following Gamergate Death Threats

October 14, 2014 9:32 am | by Lisa Vaas | Comments

US-based game developer Brianna Wu was driven from her home over the weekend after a troll posted her address online and threatened to rape, kill and mutilate her. This situation came about because of the Gamergate controversy.       

TOPICS:
Molly Sauter, a doctoral student at McGill University and a research affiliate at the Berkman Center at Harvard ("exploring cyberspace, sharing its study & pioneering its development"), has a paper calling the use of DDOS (distributed denial of service) a

Researcher Makes the Case for DDOS Attacks

October 14, 2014 8:24 am | by Larry Seltzer | Comments

Molly Sauter, a doctoral student at McGill University and a research affiliate at the Berkman Center at Harvard ("exploring cyberspace, sharing its study & pioneering its development"), has a paper calling the use of DDOS (distributed denial of service) attacks a legitimate form of activism and protest. This can't go unchallenged.

TOPICS:
Another day, another breach, and more credit cards are on the open market. I’m not sure what the thieves are going to be doing with the credit cards at this point but let’s take a look at where we are going and take a moment to reflect on what we’re doing

Strategic Incident Response to Increase Information Security after Breaches

October 13, 2014 11:10 am | by Samuel Liles | Comments

Another day, another breach, and more credit cards are on the open market. I’m not sure what the thieves are going to be doing with the credit cards at this point but let’s take a look at where we are going and take a moment to reflect on what we’re doing here in infosec land.

TOPICS:
Having an IR Team is not a guarantee of breach-free life for the organization. In this short post I am trying to list very specific reasons why breaches happen despite IR teams being present and active. Instead of writing yet-another-smart-ass-who-knows-i

Why Breaches Happen under IR Teams Noses

October 13, 2014 11:00 am | by Editor | Comments

Having an IR Team is not a guarantee of breach-free life for the organization. In this short post I am trying to list very specific reasons why breaches happen despite IR teams being present and active. Instead of writing yet-another-smart-ass-who-knows-it-all post that talks about "events are ignored," "teams are underfunded," etc.

TOPICS:

Pages

X
You may login with either your assigned username or your e-mail address.
The password field is case sensitive.
Loading