Subscribe to DFI News
View Sample

DFI News

Nine Notorious Hackers of 2013

December 30, 2013 10:15 am | by Mathew J. Schwartz, InformationWeek | Comments

This year's hacking hall of shame includes members of Anonymous and the Blackhole cybercrime gang, plus state-sponsored groups, according to a list compiled by Information Week. So, who should make the list of the world's most notorious hackers in 2013?


Hacker Took over BBC Server, Tried to 'Sell' Access

December 30, 2013 9:56 am | Comments

A hacker secretly took over a computer server at the BBC, Britain's public broadcaster, and then launched a campaign on Christmas Day to convince other cyber criminals to pay him for access to the system, according to a Reuters report.     


NSA Phone Surveillance Legal, Federal Judge Rules

December 30, 2013 9:44 am | by Larry Neumeister, Associated Press | Comments

The debate over the NSA's collection of millions of Americans' telephone records fell squarely into the courts when a federal judge in Manhattan upheld the legality of the program, citing its need in the fight against terrorism.             


Attackers Could Match Phone Numbers to Picture App Account

December 27, 2013 11:29 am | by Lucian Constantin, PC World | Comments

A security hole in popular photo messaging service Snapchat could allow attackers to find the phone numbers of many users in a short period of time, according to Gibson Security, a computer security research group.                                          


2014: The Year of ‘Madware'?

December 27, 2013 11:22 am | by Kerry Butters, Onestopclick | Comments

2013 has, as always, brought new security threats thanks to the ever-increasing world of cybercrime. We’ve seen Cryptolocker, a type of ransomware that originally targeted businesses, before moving on to attack the more lucrative (and easier) home PC market.


Senator Wants to Plug Gaps in Cybersecurity

December 27, 2013 11:19 am | by Associated Press | Comments

In the wake of last week’s security breach at retail giant Target Corp., the federal government must intensify efforts to protect consumers from cyber-criminals trolling for vital personal and financial information, Sen. Robert Menendez announced Thursday.


Digital Photography Tech Helps Spot Criminals

December 27, 2013 11:07 am | by Univ. of York | Comments

Human beings are highly efficient at recognizing familiar faces, even from very poor quality images. New research is using advances in the level of detail available in digital photography to harness this human ability for use in forensics.


Declassified Docs Argue for Keeping NSA Programs Secret

December 27, 2013 10:56 am | by Office of the Director of National Intelligence | Comments

On Saturday, James Clapper, the Director of National Intelligence, declassified a set of 10 court documents that show that the Bush and Obama administrations assert that some of the more sensitive NSA surveillance programs should be kept secret.


Police Use Social Media, Apps to Fight Crime

December 23, 2013 11:32 am | by Homeland Security News Wire | Comments

The accessibility of smartphones and the popularity of apps are making it easier for police to share and receive information from the public. Law enforcement agencies in Maine are using department-managed social media pages to engage with the public.


Demand for Forensic Accountants on the Rise

December 23, 2013 11:14 am | by Deanna C. White, accountingWEB | Comments

With an increasing number of cases hinging on complex financial information – and today's technology making those financial crimes and peccadilloes much more difficult to identify – there's a new player emerging as an indispensable part of many attorneys' legal teams: the forensic accountant.

Target Data Breach Spurs Lawsuits, Inside Suspicion

December 23, 2013 10:26 am | by Mike Snider, USA TODAY, and Antone Gonsalves, PC World | Comments

Consumer frustration and outrage over the Target credit card breach is moving from Facebook and Twitter to the courts and state governments even as the stolen accounts are flooding the black market. Three class-action lawsuits have been filed in the wake of the theft of data on about 40 million credit and debit card accounts of shoppers at Target from Nov. 27 to Dec. 15. 


Breaking the Backlog of Digital Forensic Evidence

December 23, 2013 9:01 am | by Dr. Hans Henseler, Help Net Security | Comments

It is time for a change in the way the law enforcement works with digital forensic evidence. Every police investigator needs to be able to quickly and easily analyze digital forensic evidence related to their criminal cases—from photos, videos, email, social media and Internet usage to audio and documents.


Alleged Top Moderators Of Silk Road 2 Forums Arrested in International Sweep

December 20, 2013 4:32 pm | by John Biggs, TechCrunch | Comments

At least two moderators of the Silk Road 2 user forums have been arrested by authorities in the U.S. and Ireland. A source claiming to have inside knowledge of the arrests said that Libertas, a moderator on the Silk Road 2 forums [TOR link], has been arrested by the Irish Police (Garda Siochana) in Wicklow during a raid. A source at the Wicklow Police has confirmed the arrest of the yet-unnamed moderator.


NSA Dragnet Included Allies, Aid Groups and Business Elite

December 20, 2013 4:21 pm | by James Glanz and Andrew Lehren, The New York Times | Comments

Secret documents reveal more than 1,000 targets of American and British surveillance in recent years, including the office of an Israeli prime minister, heads of international aid organizations, foreign energy companies and a European Union official involved in antitrust battles with American technology businesses.


The National Security Agency's Oversharing Problem

December 20, 2013 2:51 pm | by Sean Gallagher, Ars Technica | Comments

In the days after the attacks on September 11, 2001, the National Security Agency underwent a transformation from an organization that operated on a "need to know" basis to a "need to share" culture. In the process, the agency threw out many of the procedures and controls that might have stopped Edward Snowden from walking out the door with thousands of secret documents.



You may login with either your assigned username or your e-mail address.
The password field is case sensitive.