Advertisement
News
Subscribe to DFI News

The Lead

Two Vital Pieces of Computer Evidence Have a Hidden Source

April 23, 2014 | by Jacob Goodwin, Government Security News | Comments

Sometimes, when a computer forensics expert is dissecting a suspect’s computer, the most important question to answer is this: “Am I looking at the original hard-drive, with all of its incriminating evidence, or has that drive been swapped out surreptitiously for a new drive, which will not contain the evidence that I’m hoping to find?”

TOPICS:
View Sample

SUBSCRIBE TO FREE
DFI News
EMAIL NEWSLETTER

Dutch Man's Case Linked to Amanda Todd

April 22, 2014 11:09 am | by Jeremy Hainsworth and Toby Sterling, Associated Press | Comments

Canadian police confirmed an arrest has been made in the Netherlands in the case of a Canadian teenager who was blackmailed into exposing herself in front of a webcam. The 15-year-old later committed suicide after detailing her harassment on a YouTube video watched by millions around the world.

TOPICS:

Crime is Not Falling, It's Moved Online

April 22, 2014 10:58 am | by Tom Dry, The Telegraph | Comments

The drop in the crime rate over the past decade is misleading, according to a Hertfordshire, UK police chief. He argues that criminal behavior has moved online, where much of it goes either unreported or undetected.         

TOPICS:

Chicago Teams Created to Target Cyber Crime, Securities Fraud

April 22, 2014 10:50 am | by Kim Janssen, Chicago Sun-Times | Comments

Cyber crime and securities and commodities fraud will be targeted by new teams of Chicago prosecutors under a reshuffle ordered by U.S. Attorney Zach Fardon.                          

TOPICS:
Advertisement

Heartbleed Transforms HTTPS

April 22, 2014 10:16 am | by Dan Goodin, Ars Technica | Comments

For years, people have characterized the ineffectiveness of the online certificate status protocol (OCSP) as Exhibit A in the case that the Internet's secure sockets layer and transport layer security (TLS) protocols are hopelessly broken. Until now, no one paid much attention.

TOPICS:

Stolen Passwords Used in Most Data Breaches

April 22, 2014 10:06 am | by Kelly Jackson Higgins, Dark Reading | Comments

New Verizon 2014 Data Breach Investigations Report identifies nine types of attack patterns that accounted for 93 percent of security incidents in the past decade. Cyber criminals and cyber spies mostly log in to steal data.       

TOPICS:

US Agent Lures Romanian Hackers in Subway Data Heist

April 21, 2014 10:40 am | by Del Quentin Wilber, Bloomberg | Comments

The Secret Service and FBI are investigating an increasing number of attacks on U.S. retailers’ data. The Secret Service points to Agent Matt O’Neill's investigation that began in 2010 as an example of how they go about solving such crimes.   

TOPICS:

CEO Sought Control of Geek Bitcoin World

April 21, 2014 9:51 am | by Sophie Knight, Reuters | Comments

In June 2011, when customers of now-bankrupt bitcoin exchange Mt. Gox agitated for proof that the Tokyo-based firm was still solvent after a hacking attack, CEO Mark Karpeles turned to the comedy science fiction novel "The Hitchhikers Guide to the Galaxy."

TOPICS:

Attackers Use Reflection Techniques for Larger DDoS Attacks

April 21, 2014 9:09 am | by Help Net Security | Comments

A new global DDoS attack report from Akamai shows that in Q1 DDoS attackers relied less upon traditional botnet infection in favor of reflection and amplification techniques.                     

TOPICS:
Advertisement

Fake Peoria Mayor Twitter Account Prompts Raid

April 18, 2014 10:28 am | by Associated Press | Comments

Police officers trying to find out who was behind a fake Twitter account set up in the name of Peoria's mayor have raided a home, seizing computers and phones and hauling several people in to be questioned.             

TOPICS:

Military Satellite Systems Vulnerable to Hacking

April 18, 2014 9:34 am | by Tom Brewster, the Guardian | Comments

A range of crucial satellite systems manufactured by some of the world’s biggest government contractors contain severe vulnerabilities that could be exploited to disrupt military operations and flight-safety communications, researchers have warned.

TOPICS:

Target Hackers May Take Years to Find

April 17, 2014 3:25 pm | by Bree Fowler, Associated Press | Comments

Secret Service investigators say they are close to gaining a full understanding of the methods hackers used to breach Target's computer systems last December.                          

TOPICS:

Dark Web Search Makes Buying Guns and Drugs Easy

April 17, 2014 10:08 am | by Kim Zetter, Wired | Comments

The dark web just got a little less dark with the launch of a new search engine that lets you easily find illicit drugs and other contraband online.                             

TOPICS:

Student Hacker Arrested for Heartbleed Breach

April 17, 2014 9:52 am | by Zeljka Zorz, Help Net Security | Comments

A 19-year-old Canadian student has been arrested for breaching the systems of the Canada Revenue Agency (CRA) and extracting Social Insurance Numbers of some 900 taxpayers. It is believed that he was able to do so by exploiting the infamous Heartbleed bug.

TOPICS:

Did a Faulty Memory Feature Lead to Heartbleed?

April 17, 2014 9:40 am | by Kelly Jackson Higgins, Dark Reading | Comments

As the dust begins to settle on the Heartbleed bug, developers in the open source community are digging deeper into what really went wrong in OpenSSL to cause the encryption software to be exposed to leaking information and digital keys.   

TOPICS:

Portrait of the Cyber Criminal as a Young Man

April 16, 2014 3:44 pm | by UC Irvine | Comments

Shady stock trades are nothing new to Henry Pontell, UC Irvine professor of criminology, law & society and sociology. What’s changed isn’t the scam but the artist: In this digital age, the criminal mastermind is often a mere child.    

TOPICS:

Pages

X
You may login with either your assigned username or your e-mail address.
The password field is case sensitive.
Loading