Subscribe to DFI News
View Sample

DFI News

Belkasoft Becomes Guidance Software Partner of the Month

March 5, 2014 3:00 pm | by Belkasoft | Comments

Belkasoft, manufacturer of digital forensic software, becomes Guidance Software’s Partner of the Month.                                         


Targeting C Code to Thwart Malware Attacks

March 5, 2014 2:48 pm | by Matt Shipman, North Cartolina State Univ. | Comments

Researchers have developed a new tool to detect and contain malware that attempts root exploits in Android devices. The tool improves on previous techniques by targeting code written in the C programming language.           


Cryptocat Now Available for iPhone

March 5, 2014 9:27 am | by Zeljka Zorz, Help Net Security | Comments

Cryptocat, the popular open source application that enables users to chat online easily and securely, is now available for iPhone users (on Apple's App Store), as well.                       


Crypto Bug Leaves Linux, Apps Open to Eavesdropping

March 5, 2014 9:20 am | by Dan Goodin, Ars Technica | Comments

Hundreds of open source packages, including the Red Hat, Ubuntu, and Debian distributions of Linux, are susceptible to attacks that circumvent the most widely used technology to prevent eavesdropping on the Internet, thanks to an extremely critical vulnerability in a widely used cryptographic code library.


Bitcoin Bank Flexcoin Closes after Hack

March 5, 2014 9:05 am | by Alex Hern, the Guardian | Comments

A bitcoin bank has been forced to close after hackers stole 896 bitcoin, worth £365,000, in an attack on Sunday. The company shut its website and posted a statement on Tuesday morning detailing the loss.             


Less than Half of RSA Conference Attendees Think NSA Surveillance is Wrong

March 5, 2014 8:58 am | by Infosecurity | Comments

Even though Edward Snowden’s revelations about NSA mass surveillance programs have dominated headlines since last year and sparked an ongoing trend toward “transparency” on the part of the tech giants, it turns out that infosecurity professionals aren’t quite as concerned as the general public or some politicians.


The Most Dangerous Man in Bitcoin isn't a Criminal

March 4, 2014 10:58 am | by Max Chafkin, Fast Company | Comments

Preet Bharara and his staff are learning how to think about prosecutions in a whole new way. What's in question are the real-life identities of cloaked criminals.                         


Zeus Retrieves Attack Info Hidden in Sunset and Cat Pictures

March 4, 2014 10:18 am | by Zeljka Zorz, Help Net Security | Comments

Malware peddlers employing a new Zeus banking Trojan variant have resorted to hiding the malware's configuration file into innocuous-looking sunset and cat photos.                         


Snow Leopard: The Next Windows XP?

March 4, 2014 9:47 am | by Maxim Weinstein, Dark Reading | Comments

If Windows XP is the dinosaur in the room, then OS X Snow Leopard — despite being named after a predator — is more like a sitting duck.                                 


Malware Rates Linked to Socio-economic Factors

March 4, 2014 9:17 am | by Warwick Ashford, Computer Weekly | Comments

Regional cyber vulnerabilities are not linked to any single factor, but to a variety of different socio-economic factors.                                     


Hackers Hold for $300 Ransom

March 3, 2014 3:52 pm | by Reuters | Comments

Social networking website is fighting a sustained battle against cyber attackers who are demanding only $300 to call off a campaign that has kept the site offline for much of the past four days.             


Cyber Report on US Utilities

March 3, 2014 10:19 am | by Ayesha Rascoe, Reuters | Comments

U.S. utilities would benefit from an independent group to set industry-wide guidelines on combating cyber threats, according to a think-tank report that was co-authored by a former director of the Central Intelligence Agency.       


Hidden 'Signature' in Online Photos Could Help Nab Child Abusers

March 3, 2014 10:03 am | by Wendy Grossman, Scientific American | Comments

Police may soon have a new way to catch pedophiles who distribute child abuse photos anonymously online. The technology could also identify smartphone thieves who take pictures with the stolen gadgets and then post their snapshots on the Internet.


Florida Cops' Secret Weapon: Warrantless Cell Phone Tracking

March 3, 2014 9:45 am | by Kim Zetter, Wired | Comments

Police in Florida have offered a startling excuse for having used a controversial “stingray” cell phone tracking gadget 200 times without ever telling a judge: the device’s manufacturer made them sign a non-disclosure agreement that they say prevented them from telling the courts.


Sears: Hack or Hysteria?

March 3, 2014 9:40 am | by Infosecurity | Comments

Bloomberg has reported that US retail giant Sears "is investigating a possible security breach after a series of cyber attacks on other retailers have exposed the data of millions of consumers."               



You may login with either your assigned username or your e-mail address.
The password field is case sensitive.