Advertisement
News
Subscribe to DFI News
View Sample

SUBSCRIBE TO FREE
DFI News
EMAIL NEWSLETTER

China Says iPhone is a Threat to National Security

July 11, 2014 11:04 am | by Reuters | Comments

Chinese state media has branded Apple Inc's iPhone a threat to national security because of the smartphone's ability to track and time-stamp user locations.                           

TOPICS:

US and UK Consumers Avoid Pirated Content

July 11, 2014 9:55 am | by Infosecurity | Comments

Illegally obtaining TV and movies is almost endemic in the Asia-Pacific region though.                                               

TOPICS:

Computer Forensics Key in Hot Car Child Death Case

July 10, 2014 9:26 am | Comments

Justin Ross Harris is charged with felony murder and second-degree child cruelty in the death of his son, Cooper. He claims that he forgot to drop his son off at daycare before heading to work. Cooper Harris spent nearly seven hours in the SUV as temperatures rose to 88 degrees. Computer forensics will be key in the case as police uncovered Harris' sexting and penchant for videos about death from his computers.  

TOPICS:
Advertisement

Follow Malware's Tracks to Thwart Cyber Attacks

July 10, 2014 8:51 am | by Jason Brvenik, GCN | Comments

To defeat malware, government agencies need to determine how threats entered a network and where they went once inside. But this relatively simple task is complicated by attackers’ ability to cover their tracks and to do so over an extended period of time.

TOPICS:

Chinese Hackers Seek Info on US Workers

July 10, 2014 8:40 am | by Michael Schmidt, David Sanger and Nicole Perlroth, The New York Times | Comments

Chinese hackers in March broke into the computer networks of the United States government agency that houses the personal information of all federal employees, according to senior American officials. They appeared to be targeting the files on tens of thousands of employees who have applied for top-secret security clearances.

TOPICS:

DFI Software Helps Croatian Police Solve International Child Abuse Case

July 9, 2014 3:09 pm | Belkasoft | Comments

Digital forensic investigation software was used by Croatian Police to prosecute an international case involving exploitation of children for pornography. During this case, Croatian Police used Belkasoft Evidence Center to extract and analyze information from suspects' computers, memory dumps and hard drive images.

TOPICS:

Moscow Accuses US of 'Kidnapping' Russian Hacker

July 9, 2014 10:08 am | by Reuters | Comments

Russia accused the United States on Tuesday of violating a bilateral treaty and "kidnapping" a Russian accused of hacking into U.S. retailers' computer systems to steal credit card data.                  

TOPICS:

Facebook Helps Cripple Greek Botnet

July 9, 2014 9:49 am | by Kelly Jackson Higgins, Dark Reading | Comments

Facebook has revealed details of how it helped derail a little-known botnet operation out of Greece that was used to steal and mine digital currency and spread via Facebook and Lightcoin mining — infecting some 250,000 machines worldwide. 

TOPICS:
Advertisement

Personal Data Recovered after Android's Factory Reset

July 8, 2014 11:04 am | by Seth Rosenblatt, CNet | Comments

A new study from security software vendor Avast calls into question the effectiveness of Android's factory reset option, which many people have relied upon to delete personal data from their old smartphones before reselling or making a charitable donation with the old device.

TOPICS:

Chinese Attackers Targeting US Think Tanks

July 8, 2014 10:34 am | by Tim Wilson, Dark Reading | Comments

The Chinese cyber attack group Deep Panda late last month compromised "several" national security think tanks with multiple, simultaneous, and sophisticated attacks designed to collect information about foreign policy decisions, according to researchers at security firm CrowdStrike.

TOPICS:

Internet of Things Turns Lightbulbs into a Threat

July 8, 2014 10:16 am | by Infosecurity | Comments

The internet of things (IoT) has been described as creating a coming tsunami of data, as everything from toilets to microwaves get connected. But it's also a security "wave of terror" in some respects as every new connection threatens to be a portal for cyber criminals.

TOPICS:

Police Dog Sniffs Out Child Porn Hard Drives

July 8, 2014 9:54 am | by Katie Mulvaney, Providence Journal | Comments

Rhode Island state police, through an Internet task force, are taking a new approach to finding those that traffic in child pornography. The recent arrival of golden Labrador Thoreau makes Rhode Island the second state in the nation to have a police dog trained to sniff out hard drives, thumb drives and other technological gadgets that could contain child pornography.

TOPICS:

Malware Highlights Vulnerability of Energy Infrastructure

July 7, 2014 10:23 am | Comments

Symantec Security Response reports on an ongoing, sophisticated, very possibly state-sponsored “cyber espionage campaign dubbed Dragonfly (aka Energetic Bear)” that managed to infiltrate information systems of “energy grid operators, major electricity generation firms, petroleum pipeline operators and energy industry industrial control system (ICS) equipment manufacturers.”

TOPICS:

Female Cybersleuths Hacking Into Security Tech

July 7, 2014 10:16 am | Comments

Tiffany Rad is turning the gender stereotypes in the software industry on their head. Rad is a “white hat,” a hacker who specializes in looking for security holes so they can be fixed. The attorney turned her computer hacking hobby into a career in 2008, when she submitted a research proposal to an underground security conference in New York.

TOPICS:

Phishing Scam Targets US Marshals Service Bitcoin Auction List

July 7, 2014 10:10 am | Comments

Individuals on the recipients list of the leaked US Marshals Service email to Silk Road auction enquirers are being targeted in a phishing attack, and at least one individual has fallen for the scam. Several individuals on the list received phishing emails from the same source. However, not all the individuals on the leaked email recipients list were targeted.

TOPICS:

Pages

X
You may login with either your assigned username or your e-mail address.
The password field is case sensitive.
Loading