Subscribe to DFI News
View Sample

DFI News

Pedophiles Lured by Avatar in Tech Industry Porn Fight

April 16, 2014 11:02 am | by Kristen Schweizer, Bloomberg | Comments

Sweetie looks much like other unfortunate young Filipinas. But unlike her peers, Sweetie is a computer-generated avatar created by a Dutch non-profit group seeking to unmask sexual predators on the Internet.            


Inside Europe's Digital Crime Unit

April 16, 2014 10:37 am | by Tom Brewster, the Guardian | Comments

Four black brick towers search upwards to an empty grey sky. Mounted security cameras watch on balefully. If it weren’t for all the cheery cyclists passing by, some with surfboards in hand, alleviating the unfaltering graveness of the place, Europol’s headquarters would strike any visitor as some post-apocalyptic Mordor.


(ISC)² Offers Cyber Forensics Certification in Europe

April 16, 2014 10:24 am | by (ISC)2 | Comments

The Certified Cyber Forensics Professional is the only global standard currently available for assessing experienced digital forensics professionals’ mastery of the discipline. Originally only available for the U.S. and South Korea, the credential has been developed for the European legal environment.


Pulitzer for NSA Coverage Echoes Tradition in News

April 15, 2014 11:00 am | by Brett Zonger, Associated Press | Comments

Coverage of the National Security Agency's sweeping surveillance program that won the Pulitzer Prize for public service Monday follows a tradition of bucking the U.S. government on matters of secret intelligence.           


Heartbleed Bug Affects Android Phones, Other Devices

April 15, 2014 10:20 am | by Dan Goodin, Ars Technica | Comments

The catastrophic Heartbleed security bug that has already bitten Yahoo Mail, the Canada Revenue Agency, and other public websites also poses a formidable threat to end-user applications and devices, including millions of Android handsets, security researchers warn.


First Phase of TrueCrypt Audit Finds No Backdoors

April 15, 2014 9:58 am | by Zeljka Zorz, Help Net Security | Comments

Investigator's have found no evidence of backdoors or otherwise intentionally malicious code in the assessed areas of TrueCrypt's Windows kernel code, bootloader, filesystem driver or areas around this code.            


China-backed Cyber Threats Aren't Stopping

April 15, 2014 9:42 am | by Infosecurity | Comments

More than a year after security firm Mandiant caused a stir by publishing a report that alleged China was behind widespread and increasingly sophisticated cyberespionage projects, it’s back again to tell us that things have gone from bad to worse.


Air Force Cadets Take Second Place in NSA Cyber Exercise

April 15, 2014 9:30 am | by U.S. Air Force Academy | Comments

The Air Force Academy took second place at the conclusion of the 14th annual National Security Administration inter-service Cyber Defense Exercise on April 8-11.                         


Chad Tilbury Joins CrowdStrike as Technical Director

April 14, 2014 10:39 am | Comments

Tilbury will provide technical leadership for the services team, driving innovation to support customers in a variety of offerings, including incident response, remediation, forensic support, penetration testing, intelligence operations, and counter-threat assessments.    


Appeals Court Overturns AT&T Hacker's Sentence

April 14, 2014 10:21 am | by Zeljka Zorz, Help Net Security | Comments

A US federal appeals court has vacated the conviction and sentence received by Andrew "weev" Auernheimer for the AT&T iPad hack.                                  


Nine Charged in Conspiracy Using Zeus Malware

April 14, 2014 10:10 am | by DOJ | Comments

Nine alleged members of a wide-ranging racketeering enterprise and conspiracy who infected thousands of business computers with malicious software known as “Zeus” have been charged in an indictment.               


Feds Address Antitrust Concerns on Cyberthreat Sharing

April 14, 2014 9:59 am | by William Jackson, Information Week | Comments

The Justice Department and the Federal Trade Commission are trying to allay private-sector fears that sharing cyberthreat information could be seen as a violation of antitrust laws.                   


Obama Lets NSA Exploit Some Internet Flaws

April 14, 2014 8:44 am | by David Sanger, The New York Times | Comments

Stepping into a heated debate within the nation’s intelligence agencies, President Obama has decided that when the National Security Agency discovers major flaws in Internet security, it should — in most circumstances — reveal them to assure that they will be fixed, rather than keep mum so that the flaws can be used in espionage or cyber attacks.


Hackers Forge Credit Cards with South Korean Data

April 11, 2014 10:23 am | by Reuters | Comments

Hackers stole the personal information of about 200,000 South Korean credit card users, using some to make fake cards and rack up fraudulent charges of about 120 million won ($115,400), an official of the country's financial regulator say.   


Has the NSA Utilized the Heartbleed Bug?

April 11, 2014 10:06 am | by Kim Zetter, Wired | Comments

The Heartbleed bug is also unusually worrisome because it could possibly be used by hackers to steal your usernames and passwords — for sensitive services like banking, ecommerce, and web-based email — and by spy agencies to steal the private keys that vulnerable web sites use to encrypt your traffic to them.



You may login with either your assigned username or your e-mail address.
The password field is case sensitive.