Subscribe to DFI News

The Lead

Money Laundered through Online Gambling Sites

April 24, 2014 | by Help Net Security | Comments

A new report by McAfee sheds light on the underground world of online gambling. It identifies the proliferation of online casinos, an industry set to grow nearly 30 percent over the next three years, and how their use is fuelling cyber crime by making it easy to “cash in” on illegal activities.

View Sample

DFI News

NIST Removes Cryptography Algorithm from Random Number Generator Recommendations

April 24, 2014 9:22 am | by NIST | Comments

Following a public comment period and review, NIST has removed a cryptographic algorithm from its draft guidance on random number generators. Before implementing the change, NIST is requesting final public comment.         


iPhones and Macs Get Cryto Bug Fix

April 23, 2014 10:32 am | by Dan Goodin, Ars Technica | Comments

Apple has patched versions of its iOS and OS X operating systems to fix yet another extremely critical cryptography vulnerability that leaves some users open to surreptitious eavesdropping.                 


Ramping Up Cybersecurity

April 23, 2014 9:52 am | by Joe McGonegal, MIT Technology Review | Comments

Criminals use a range of tactics from simple email scams to social-media threats to sophisticated malware, but only 11 percent of U.S. businesses have adopted industry-standard cybersecurity measures.              


OpenBSD Forks OpenSSL to Create Safer SSL/TLS Library

April 23, 2014 9:36 am | by Zeljka Zorz, Help Net Security | Comments

For all the talk about how something should be done to fix OpenSSL so that a Heartbleed situation is never again repeated, there has been little to no concrete action so far.                     


Two Vital Pieces of Computer Evidence Have a Hidden Source

April 23, 2014 8:59 am | by Jacob Goodwin, Government Security News | CyanLine | Comments

Sometimes, when a computer forensics expert is dissecting a suspect’s computer, the most important question to answer is this: “Am I looking at the original hard-drive, with all of its incriminating evidence, or has that drive been swapped out surreptitiously for a new drive, which will not contain the evidence that I’m hoping to find?”


Dutch Man's Case Linked to Amanda Todd

April 22, 2014 11:09 am | by Jeremy Hainsworth and Toby Sterling, Associated Press | Comments

Canadian police confirmed an arrest has been made in the Netherlands in the case of a Canadian teenager who was blackmailed into exposing herself in front of a webcam. The 15-year-old later committed suicide after detailing her harassment on a YouTube video watched by millions around the world.


Crime is Not Falling, It's Moved Online

April 22, 2014 10:58 am | by Tom Dry, The Telegraph | Comments

The drop in the crime rate over the past decade is misleading, according to a Hertfordshire, UK police chief. He argues that criminal behavior has moved online, where much of it goes either unreported or undetected.         


Chicago Teams Created to Target Cyber Crime, Securities Fraud

April 22, 2014 10:50 am | by Kim Janssen, Chicago Sun-Times | Comments

Cyber crime and securities and commodities fraud will be targeted by new teams of Chicago prosecutors under a reshuffle ordered by U.S. Attorney Zach Fardon.                          


Heartbleed Transforms HTTPS

April 22, 2014 10:16 am | by Dan Goodin, Ars Technica | Comments

For years, people have characterized the ineffectiveness of the online certificate status protocol (OCSP) as Exhibit A in the case that the Internet's secure sockets layer and transport layer security (TLS) protocols are hopelessly broken. Until now, no one paid much attention.


Stolen Passwords Used in Most Data Breaches

April 22, 2014 10:06 am | by Kelly Jackson Higgins, Dark Reading | Comments

New Verizon 2014 Data Breach Investigations Report identifies nine types of attack patterns that accounted for 93 percent of security incidents in the past decade. Cyber criminals and cyber spies mostly log in to steal data.       


US Agent Lures Romanian Hackers in Subway Data Heist

April 21, 2014 10:40 am | by Del Quentin Wilber, Bloomberg | Comments

The Secret Service and FBI are investigating an increasing number of attacks on U.S. retailers’ data. The Secret Service points to Agent Matt O’Neill's investigation that began in 2010 as an example of how they go about solving such crimes.   


CEO Sought Control of Geek Bitcoin World

April 21, 2014 9:51 am | by Sophie Knight, Reuters | Comments

In June 2011, when customers of now-bankrupt bitcoin exchange Mt. Gox agitated for proof that the Tokyo-based firm was still solvent after a hacking attack, CEO Mark Karpeles turned to the comedy science fiction novel "The Hitchhikers Guide to the Galaxy."


Attackers Use Reflection Techniques for Larger DDoS Attacks

April 21, 2014 9:09 am | by Help Net Security | Comments

A new global DDoS attack report from Akamai shows that in Q1 DDoS attackers relied less upon traditional botnet infection in favor of reflection and amplification techniques.                     


Fake Peoria Mayor Twitter Account Prompts Raid

April 18, 2014 10:28 am | by Associated Press | Comments

Police officers trying to find out who was behind a fake Twitter account set up in the name of Peoria's mayor have raided a home, seizing computers and phones and hauling several people in to be questioned.             


Military Satellite Systems Vulnerable to Hacking

April 18, 2014 9:34 am | by Tom Brewster, the Guardian | Comments

A range of crucial satellite systems manufactured by some of the world’s biggest government contractors contain severe vulnerabilities that could be exploited to disrupt military operations and flight-safety communications, researchers have warned.



You may login with either your assigned username or your e-mail address.
The password field is case sensitive.