Subscribe to DFI News
View Sample

DFI News

Personal Data Recovered after Android's Factory Reset

July 8, 2014 11:04 am | by Seth Rosenblatt, CNet | Comments

A new study from security software vendor Avast calls into question the effectiveness of Android's factory reset option, which many people have relied upon to delete personal data from their old smartphones before reselling or making a charitable donation with the old device.


Chinese Attackers Targeting US Think Tanks

July 8, 2014 10:34 am | by Tim Wilson, Dark Reading | Comments

The Chinese cyber attack group Deep Panda late last month compromised "several" national security think tanks with multiple, simultaneous, and sophisticated attacks designed to collect information about foreign policy decisions, according to researchers at security firm CrowdStrike.


Internet of Things Turns Lightbulbs into a Threat

July 8, 2014 10:16 am | by Infosecurity | Comments

The internet of things (IoT) has been described as creating a coming tsunami of data, as everything from toilets to microwaves get connected. But it's also a security "wave of terror" in some respects as every new connection threatens to be a portal for cyber criminals.


Police Dog Sniffs Out Child Porn Hard Drives

July 8, 2014 9:54 am | by Katie Mulvaney, Providence Journal | Comments

Rhode Island state police, through an Internet task force, are taking a new approach to finding those that traffic in child pornography. The recent arrival of golden Labrador Thoreau makes Rhode Island the second state in the nation to have a police dog trained to sniff out hard drives, thumb drives and other technological gadgets that could contain child pornography.


Malware Highlights Vulnerability of Energy Infrastructure

July 7, 2014 10:23 am | Comments

Symantec Security Response reports on an ongoing, sophisticated, very possibly state-sponsored “cyber espionage campaign dubbed Dragonfly (aka Energetic Bear)” that managed to infiltrate information systems of “energy grid operators, major electricity generation firms, petroleum pipeline operators and energy industry industrial control system (ICS) equipment manufacturers.”


Female Cybersleuths Hacking Into Security Tech

July 7, 2014 10:16 am | Comments

Tiffany Rad is turning the gender stereotypes in the software industry on their head. Rad is a “white hat,” a hacker who specializes in looking for security holes so they can be fixed. The attorney turned her computer hacking hobby into a career in 2008, when she submitted a research proposal to an underground security conference in New York.


Phishing Scam Targets US Marshals Service Bitcoin Auction List

July 7, 2014 10:10 am | Comments

Individuals on the recipients list of the leaked US Marshals Service email to Silk Road auction enquirers are being targeted in a phishing attack, and at least one individual has fallen for the scam. Several individuals on the list received phishing emails from the same source. However, not all the individuals on the leaked email recipients list were targeted.


Smartphones Can Still Be Searched by Border Cops

July 7, 2014 9:57 am | Comments

The Supreme Court released a landmark unanimous ruling last Wednesday limiting the ability of police officers to search a suspect's cellphone. But don't expect the Supreme Court's limitations to impact all law enforcement, because, as Aaron Sankin detailed on the Daily Dot, the United States Customs and Border Protection (CBP) still don't need to consult with a judge before browsing through your smartphone.


Child Rape Case Leaves Mysteries

July 2, 2014 1:46 pm | by Mitch Weiss, Ray Henry and Kate Brumback, Associated Press | Comments

Matthew Coniglio's Georgia home held a trove of child pornography, more than 50,000 images and videos stored on laptops, external hard drives and thumb drives.                         


Cybercrime Scheme Aims at Payments in Brazil

July 2, 2014 1:27 pm | by Nicole Perlroth, The New York Times | Comments

Security researchers have uncovered what they believe is a significant cybercrime operation in Brazil that took aim at $3.75 billion in transactions by Brazilians. Even half of that value was redirected to criminals, the scope of the swindle would eclipse any other previous electronic theft.


Physical Location of Data Will Become Increasingly Irrelevant

July 2, 2014 12:44 pm | by Gartner | Comments

The physical location of data still matters, but will become increasingly irrelevant and will be replaced by a combination of legal location, political location and logical location in most organizations by 2020, according to a report from Gartner, Inc.


Supreme Court Cites NIST Mobile Forensics Guide in Ruling on Cell Phone Searches

July 2, 2014 12:20 pm | by NIST | Comments

In considering the question of cell phone searches by police without a warrant, the Supreme Court ruling in Riley v California had to mesh established policy on search warrants together with an understanding of cell phone technology. To help with that challenge, the justices turned to a variety of sources, among them the NIST Guidelines on Mobile Device Forensics


Cybercrooks Breed Self-Cloning Mutant That Steals Your Bank Details

July 2, 2014 8:38 am | by John Leyden, the Register | Comments

Cybercrooks have put together a botnet client which bundles in worm-like functionality that gives it the potential to spread quickly. Seculert warns that the latest version of the Cridex (AKA Geodo) information stealing Trojan includes a self-spreading infection method.


When Does Virtual Crime Become An Actual Crime?

July 2, 2014 8:18 am | Comments

In his mind and online persona, Gilberto Valle left little doubt about the depths of his depravation: In communications over the Internet, he imagined subjecting women he knew to sex-related torture and, in some cases, murder and cannibalism. However, the judge concluded that Mr. Valle’s Internet plotting had been “fantasy role play” and was not evidence of an actual crime.


US to Ask China to Restart Cyber Working Group

July 1, 2014 12:20 pm | by Matthew Pennington, Associated Press | Comments

The United States wants to restart a cybersecurity working group that China shut down after the U.S. indicted five Chinese military officers on charges of hacking into American companies' computers to steal trade secrets.        



You may login with either your assigned username or your e-mail address.
The password field is case sensitive.