Advertisement
News
Subscribe to DFI News
View Sample

SUBSCRIBE TO FREE
DFI News
EMAIL NEWSLETTER

Embedded systems — small computer systems built around microcontrollers — are becoming more common. But they remain vulnerable to security breaches.

Making the Internet of Things Safer

June 26, 2014 12:16 pm | by UC San Diego | Comments

As a result of the advance of the so-called Internet of Things, where all devices are connected and communicate with one another, embedded systems — small computer systems built around microcontrollers — are becoming more common. But they remain vulnerable to security breaches.

TOPICS:
Utica College has been designated as a National Center of Academic Excellence in Information Assurance and Cyber Defense Education by the National Security Agency (NSA) and the Department of Homeland Security.

UC Cyber Progams Endorsed by Major Government Agencies

June 25, 2014 4:16 pm | by Victoria Lamanna, Utica College | Comments

Utica College has been designated as a National Center of Academic Excellence in Information Assurance and Cyber Defense Education by the National Security Agency (NSA) and the Department of Homeland Security. In addition, it's only the seventh institution of higher learning in the country to earn a National Center for Digital Forensics Academic Excellence (CDFAE) from the Defense Cyber Crime Center (DC3).

In an emphatic defense of privacy in the digital age, a unanimous Supreme Court ruled Wednesday that police generally may not search the cellphones of people they arrest without first getting search warrants.

Police Need a Warrant to Search Cell Phones, Justices Say

June 25, 2014 3:24 pm | by Mark Sherman, Associated Press | Comments

In an emphatic defense of privacy in the digital age, a unanimous Supreme Court ruled Wednesday that police generally may not search the cellphones of people they arrest without first getting search warrants.            

TOPICS:
Advertisement
Economic espionage and cyber crime are short-sighted activities that jeopardize Internet stability and global online commerce

Cyber Espionage Threatens Global Economy, Not Just States

June 25, 2014 11:42 am | by Dark Reading | Comments

Economic espionage and cyber crime are short-sighted activities that jeopardize Internet stability and global online commerce, according to a new report issued by the Centre for International Governance Innovation (CIGI).        

TOPICS:
UBIC, Inc. has announced its new high-level analysis support solutions service for third-party investigation charged with investigating corporate fraud and other cases of inappropriate practices in Japan.

Advanced Forensic Tool Supports Third-party Investigation

June 25, 2014 11:13 am | by UBIC, Inc. | Comments

UBIC, Inc., a provider of international litigation support and big-data analysis services, has announced its new high-level analysis support solutions service for third-party investigation charged with investigating corporate fraud and other cases of inappropriate practices in Japan.

TOPICS:
Nuix has appointed experienced digital forensics investigator Chris Pogue as Senior Vice President for Cyber Threat Analysis.

Nuix Appoints Digital Forensics and Incident Response Expert

June 24, 2014 4:36 pm | Nuix | Comments

Nuix has appointed experienced digital forensics investigator Chris Pogue as Senior Vice President for Cyber Threat Analysis. Pogue brings experience with Trustwave SpiderLabs, the IBM/ISS X-Force incident response and ethical hacking teams and the US Army Signal Corps to Nuix’s growing cybersecurity team.

TOPICS:
Law enforcement agencies across the globe are taking a page out of the cybercriminal handbook, using targets' own phones and computers to spy on them with methods traditionally associated with the world's most malicious hackers

Experts Reveal Police Hacking Methods

June 24, 2014 4:08 pm | by Raphael Satter, Associated Press | Comments

Law enforcement agencies across the globe are taking a page out of the cybercriminal handbook, using targets' own phones and computers to spy on them with methods traditionally associated with the world's most malicious hackers, two computer security groups say.

TOPICS:
Complaints originating from social media make up "at least half" of calls passed on to front-line officers

Social Media Calls Passed to Front-line Police in UK

June 24, 2014 12:43 pm | by Keith Moore, BBC | Comments

Complaints originating from social media make up "at least half" of calls passed on to front-line officers, a senior officer has told the BBC.                               

TOPICS:
Advertisement
InfoSec teams should expand their rapid incident detection and response capabilities to mobile devices that have access to sensitive data.

Mobile Security Needs Incident Readiness

June 24, 2014 11:47 am | by AccessData | Comments

AccessData and Gigaom Research have released a report on the growing complexities of mobile security and the limitations of “preventive, policy-driven” solutions that are not designed to detect and respond to mobile security incidents that bypass defenses.

TOPICS:
Newly Observed Domains (NOD), a new set of data solutions that provide real-time actionable insights on young domain names.

Farsight Security Launches at the FIRST Conference in Boston

June 24, 2014 11:17 am | by Farsight Security, Inc. | Comments

Farsight Security, Inc., has emerged from stealth mode at the FIRST Conference in Boston, Massachusetts to debut Newly Observed Domains (NOD), a new set of data solutions that provide real-time actionable insights on young domain names.   

TOPICS:

Reuters Hacked via Taboola Ad

June 23, 2014 9:49 am | Comments

The website of the news agency Reuters has been hacked by the Syrian Electronic Army (SEA) again - condemning the news site for publishing "false" articles about Syria. The SEA reportedly corrupted Taboola web ads on Reuters articles to redirect traffic to a page under the hackers' control.

TOPICS:

Penetration Testing: A Hands-On Introduction to Hacking

June 23, 2014 9:38 am | by Sandra Henry-Stocker | Comments

Just recently published by no starch press, Penetration Testing: A Hands-On Introduction to Hacking can give you a solid -- practical, useful and insightful -- understanding of how hackers work and how you can use the same methods and tools to guard your systems against attack. 

TOPICS:

Fight Over Child Porn Evidence Pits Prosecutors Against Former Detective

June 23, 2014 9:20 am | Comments

The four words float through a messy criminal case, two contentious lawsuits and multiple appeals to the Washington State Supreme Court filed over the past three years. “We can’t see her.” The four words refer to an ugly photo: one frame in an infamous series of child pornography images, familiar to those who collect them like baseball cards.

TOPICS:

Cybersecurity Center Earns DHS, NSA Designation

June 23, 2014 9:04 am | Comments

Kansas State University's cybersecurity center is receiving national recognition for its dedication to cutting-edge research. The university's Center for Information and Systems Assurance has been redesignated as a National Center of Academic Excellence in Information Assurance/Cyber Defense Research. The designation is from the U.S. Department of Homeland Security and the National Security Agency and is effective from 2014 to 2019.

TOPICS:

Network Forensics Makes an Impact at the Army’s NIE

June 23, 2014 8:56 am | by Capt. Ray Ragan | Comments

The U.S. Army Electronic Proving Ground traditionally provides expertise in instrumentation for technology-based systems and is the Army’s designated tester for C4ISR systems, as part of the Army Test and Evaluation Command. This year, in addition to supporting with instrumentation, USAEPG brought a network forensics team to the technology-centric field evaluation.

TOPICS:

Pages

X
You may login with either your assigned username or your e-mail address.
The password field is case sensitive.
Loading