Subscribe to DFI News
View Sample

DFI News

Virginia Governor Moves to Save Alicia’s Law

April 28, 2014 9:38 am | by PROTECT | Comments

Alicia’s Law, the popular anti-child pornography initiative believed to be dead in 2014, comes roaring back to life when the Virginia General Assembly votes on a surprise proposal by Governor Terry McAuliffe to save the legislation.     


Colorado Lawmakers Advance Bill to Crack Down on 'Revenge Porn'

April 25, 2014 10:27 am | by Keith Coffman, Reuters | Comments

A bill that would criminalize the posting of intimate images over the Internet as an act of humiliation — so-called "revenge porn" — passed its first test in the Colorado state legislature, sailing unanimously through a key committee.


Silk Road Dealer Pleading Guilty to Bitcoins-for-drugs Scheme

April 25, 2014 10:23 am | by DOJ | Comments

A Dutch man who allegedly used the shuttered Silk Road underground website to sell illegal drugs for bitcoins worth millions of dollars has agreed to plead guilty to a federal drug conspiracy charge filed against him.         


Cellphone Data-wipe Poses Risk to Evidence Collection

April 25, 2014 9:59 am | by Andy Greenberg, Wired | Comments

American law enforcement has long advocated for universal “kill switches” in cellphones to cut down on mobile device thefts. Now the Department of Justice argues that the same remote locking and data-wiping technology represents a threat to police investigations — one that means they should be free to search phones without a warrant.


FBI Informant Tied to Cyber Attacks Abroad

April 25, 2014 9:11 am | by Mark Mazzetti, The New York Times | Comments

An informant working for the F.B.I. coordinated a 2012 campaign of hundreds of cyber attacks on foreign websites, including some operated by the governments of Iran, Syria, Brazil and Pakistan, according to documents and interviews with people involved in the attacks.


Web-based Program Manages App Vetting Workflow

April 25, 2014 8:54 am | by NIST | Comments

The first open source web application for managing the mobile app vetting process is available for free from the National Institute of Standards and Technology (NIST).                       


Money Laundered through Online Gambling Sites

April 24, 2014 11:12 am | by Help Net Security | Comments

A new report by McAfee sheds light on the underground world of online gambling. It identifies the proliferation of online casinos, an industry set to grow nearly 30 percent over the next three years, and how their use is fuelling cyber crime by making it easy to “cash in” on illegal activities.


Tech Giants Agree to Fund OpenSSL after Heartbleed

April 24, 2014 10:18 am | by Jon Brodkin, Ars Technica | Comments

The important role OpenSSL plays in securing the Internet has never been matched by the financial resources devoted to maintaining it.                                 


Verizon DBIR Wake-up Call

April 24, 2014 9:58 am | by Infosecurity | Comments

Verizon released its Verizon Data Breach Investigations report (DBIR) recently, showing both an uptick in security incidents and a rising inability of enterprises to keep up with the rapidly evolving innovation on the part of cyber attackers.  


Global Shipping Fleet Exposed to Hacking Threat

April 24, 2014 9:50 am | by Jeremy Wagstaff, Reuters | Comments

In this internet age, as more devices are hooked up online, so they become more vulnerable to attack. As industries like maritime and energy connect ships, containers and rigs to computer networks, they expose weaknesses that hackers can exploit.


NIST Removes Cryptography Algorithm from Random Number Generator Recommendations

April 24, 2014 9:22 am | by NIST | Comments

Following a public comment period and review, NIST has removed a cryptographic algorithm from its draft guidance on random number generators. Before implementing the change, NIST is requesting final public comment.         


iPhones and Macs Get Cryto Bug Fix

April 23, 2014 10:32 am | by Dan Goodin, Ars Technica | Comments

Apple has patched versions of its iOS and OS X operating systems to fix yet another extremely critical cryptography vulnerability that leaves some users open to surreptitious eavesdropping.                 


Ramping Up Cybersecurity

April 23, 2014 9:52 am | by Joe McGonegal, MIT Technology Review | Comments

Criminals use a range of tactics from simple email scams to social-media threats to sophisticated malware, but only 11 percent of U.S. businesses have adopted industry-standard cybersecurity measures.              


OpenBSD Forks OpenSSL to Create Safer SSL/TLS Library

April 23, 2014 9:36 am | by Zeljka Zorz, Help Net Security | Comments

For all the talk about how something should be done to fix OpenSSL so that a Heartbleed situation is never again repeated, there has been little to no concrete action so far.                     


Two Vital Pieces of Computer Evidence Have a Hidden Source

April 23, 2014 8:59 am | by Jacob Goodwin, Government Security News | CyanLine | Comments

Sometimes, when a computer forensics expert is dissecting a suspect’s computer, the most important question to answer is this: “Am I looking at the original hard-drive, with all of its incriminating evidence, or has that drive been swapped out surreptitiously for a new drive, which will not contain the evidence that I’m hoping to find?”



You may login with either your assigned username or your e-mail address.
The password field is case sensitive.