Advertisement
News
Subscribe to DFI News
View Sample

SUBSCRIBE TO FREE
DFI News
EMAIL NEWSLETTER

Digital forensics firm Cellebright has moved from copying contacts on mobile phones to digital forensics, helping police collar the bad guys along the way.

Company Gets Smartphones to Rat Out Criminal Owners

October 15, 2014 12:09 pm | by Niv Lilien, ZDNet | Cellebrite USA, Inc. | Comments

Digital forensics firm Cellebright has moved from copying contacts on mobile phones to digital forensics, helping police collar the bad guys along the way.                           

TOPICS:
In an interview with ISMG, Garet Moravec, an independent security consultant, offers a hypothetical example of thwarting Chinese hackers trying to breach a defense contractor's systems to pilfer designs on a jet fighter by using a honeypot, a trap contain

Hackers Manipulated as Advanced Threat Response

October 15, 2014 11:09 am | by Eric Chabrow, Gov Info Security | Comments

In an interview with ISMG, Garet Moravec, an independent security consultant, offers a hypothetical example of thwarting Chinese hackers trying to breach a defense contractor's systems to pilfer designs on a jet fighter by using a honeypot, a trap containing fake information that's designed to look like part of a network.

TOPICS:

Social Media No Help in Bank's Cyber Crime Fight

October 15, 2014 10:47 am | by Steve Slater, Reuters | Comments

Banks are fighting an uphill battle to protect themselves and their client accounts from cyber attacks, and the sometimes careless use of social media by customers and staff isn't making the fight any easier.           

TOPICS:
Advertisement
From the researchers that brought you BEAST and CRIME comes another attack against Secure Sockets Layer (SSL), one of the protocols that's used to secure Internet traffic from eavesdroppers both government and criminal.

SSL Under Attack by POODLE

October 15, 2014 10:11 am | by Peter Bright, Ars Technica | Comments

From the researchers that brought you BEAST and CRIME comes another attack against Secure Sockets Layer (SSL), one of the protocols that's used to secure Internet traffic from eavesdroppers both government and criminal.         

TOPICS:
It's not just big businesses like JPMorgan Chase, Target and Home Depot that get hacked. Small companies suffer from intrusions into their computer systems, too.

Hacking a Big Danger for Small Businesses

October 14, 2014 10:34 am | by Joyce Rosenberg, Associated Press | Comments

It's not just big businesses like JPMorgan Chase, Target and Home Depot that get hacked. Small companies suffer from intrusions into their computer systems, too.                         

TOPICS:

Snapsaved.com Claims Hackers Stole Snapchat Images

October 14, 2014 10:25 am | by Reuters | Comments

Snapsaved.com, a website which allows users to save images sent via Snapchat, claims that hackers had breached its servers and made off with some 500 megabytes of photographs.                     

TOPICS:
A group of cyber spies targeted the North Atlantic Treaty Organization (NATO), Ukrainian and Polish government agencies, and a variety of sensitive European industries over the last year, in some cases using a previously unknown flaw in Windows systems to

Sandworm Cyber Spies Target NATO, Ukraine

October 14, 2014 10:16 am | by Robert Lemos, Ars Technica | Comments

A group of cyber spies targeted the North Atlantic Treaty Organization (NATO), Ukrainian and Polish government agencies, and a variety of sensitive European industries over the last year, in some cases using a previously unknown flaw in Windows systems to infiltrate targets, according to a research report.

TOPICS:
The Mayhem botnet is here to wreak, well, mayhem — and it’s using the Shellshock vulnerability to do it with fresh purpose.

Mayhem Botnet Takes to Shellshock

October 14, 2014 9:55 am | by Tara Seals, Infosecurity Magazine | Comments

The Mayhem botnet is here to wreak, well, mayhem — and it’s using the Shellshock vulnerability to do it with fresh purpose.                                    

TOPICS:
Advertisement
Dropbox has denied that they have been hacked, and that the login credentials leaked by a unknown individual on Pastebin are those of Dropbox users.

Dropbox Says It Wasn't Hacked

October 14, 2014 9:45 am | by Zeljka Zorz, Help Net Security | Comments

Dropbox has denied that they have been hacked, and that the login credentials leaked by a unknown individual on Pastebin are those of Dropbox users.                             

TOPICS:
A class of coding vulnerabilities could allow attackers to fool Windows system administrators into running malicious code because of a simple omission: quotation marks.

Poor Punctuation Leads to Windows Shell Vulnerability

October 13, 2014 11:46 am | by Robert Lemos, Ars Technica | Comments

A class of coding vulnerabilities could allow attackers to fool Windows system administrators into running malicious code because of a simple omission: quotation marks.                       

TOPICS:

Snapchat Blames Third-party Apps for Leaked Photos

October 13, 2014 11:39 am | by Alexei Oreskovic, Reuters | Comments

Mobile messaging company Snapchat blamed third-party software apps for possible security lapses that may have led to its users' private photos being at risk of online publication by hackers.                 

TOPICS:
First via a filing with the US Securities and Exchange Commission, and then via a press release, Sears Holding Corporation has confirmed a month-old breach that affected POS systems at its Kmart stores.

Kmart Confirms Month-old Data Breach

October 13, 2014 11:32 am | by Zeljka Zorz, Help Net Security | Comments

First via a filing with the US Securities and Exchange Commission, and then via a press release, Sears Holding Corporation has confirmed a month-old breach that affected POS systems at its Kmart stores.             

TOPICS:
There are only "around 100" cybercriminal kingpins behind global cyber crime, according to the head of Europol's Cybercrime Centre. Law enforcers needed to target the "rather limited group of good programmers."

Only 100 Cybercrime Brains Worldwide Says Europol Boss

October 13, 2014 11:22 am | by BBC | Comments

There are only "around 100" cybercriminal kingpins behind global cyber crime, according to the head of Europol's Cybercrime Centre. Law enforcers needed to target the "rather limited group of good programmers."           

TOPICS:
Locked Shields is among the world’s preeminent cyberattack simulations. For two days, international teams of hackers and system admins play both sides of a war game, simultaneously attacking and defending critical infrastructure. The details are realistic

Hackers Gather for Cyberwar in an International Simulation

October 10, 2014 11:27 am | by Kim Zetter and Pete Brook, Wired | Comments

Locked Shields is among the world’s preeminent cyberattack simulations. For two days, international teams of hackers and system admins play both sides of a war game, simultaneously attacking and defending critical infrastructure. The details are realistic, and the exercises reflect real-world geopolitics.

TOPICS:

Inside the Homeland Security Investigations Computer Forensics Lab

October 10, 2014 10:57 am | by Vince Lattanzio, NBC Philidelphia | Comments

Nearly every case Homeland Security Investigations (HSI) opens has some sort of digital evidence to be collected and analyzed. But the work can’t be done by just anyone. The data must be meticulously cared for by agents trained to preserve the integrity of the material, who can also combat suspects’ attempts to erase their digital dealings — even from afar.

TOPICS:

Pages

X
You may login with either your assigned username or your e-mail address.
The password field is case sensitive.
Loading