Subscribe to DFI News
View Sample

DFI News

It's alive! Once-prolific Flashback Trojan Still Infecting 22,000 Macs

January 9, 2014 3:45 pm | by Dan Goodin, Ars Technica | Comments

The Flashback trojan that hijacked well over 500,000 Macs at its peak is still clinging to life, with about 22,000 infected machines in recent days, a security researcher said. The compromised Macs were observed connecting to command and control servers that had been "sinkholed — meaning taken over for research or security purposes — by analysts from security firm Intego.


Two Thirds of Personal Banking Apps Found Full of Vulnerabilities

January 9, 2014 2:22 pm | by Infosecurity | Comments

A researcher looked at the security of home banking apps, and found shocking results. Forty home banking apps from the top 60 most influential banks in the world were tested and found to have major security weaknesses.         


New York Comptroller Questions AT&T Surveillance Report Plan

January 9, 2014 10:32 am | by Ross Kerber, Reuters | Comments

A plan by AT&T Inc to explain how it shares some customer information with government agencies may not be enough to restore public trust, an attorney for New York State Comptroller Thomas DiNapoli told securities regulators.      


Singling out RSA Diverts Attention from Other NSA Culprits

January 9, 2014 10:15 am | by Jaikumar Vijayan, Computerworld | Comments

RSA may well have earned much of the criticism being heaped upon it for allegedly enabling a backdoor in one of its encryption technologies under a contract with the National Security Agency. But singling out the company for reproach deflects attention from the role that other technology vendors may have had in enabling the NSA's data collection activities.


Obama Ponders Limiting NSA Access to Phone Records

January 9, 2014 9:15 am | by Julia Pace, Associated Press | Comments

President Barack Obama is expected to rein in spying on foreign leaders and is considering restricting National Security Agency access to Americans' phone records, according to people familiar with a White House review of the government's surveillance programs.


Increasing Mobile Evidence Knowledge

January 7, 2014 2:44 pm | by Christa Miller, | Comments

More law enforcement agencies are doing more with less, but digital evidence keeps growing. Many digital evidence labs are backlogged. Some agencies are responding by asking personnel to wear more hats: computer forensics tasked with mobile forensics, investigators tasked with some digital evidence analysis. Therefore, asking for or obtaining all the evidence on every mobile device is less and less realistic.


After Cryptolocker, Experts Warn of New File-encrypting Ransomware

January 7, 2014 2:19 pm | by Computerworld | Comments

A team of malware developers is preparing to sell a new ransomware program that encrypts files on infected computers and asks victims for money to recover them, according to a volunteer group of security researchers who tracked the development of the threat on underground forums in recent weeks. 


SANS Investigative Forensic Toolkit (SIFT) Workstation Version 3.0 to Debut at DFIRCON

January 7, 2014 2:01 pm | by SANS | Comments

SANS Institute will debut a new version of its popular digital forensic examination toolkit, SIFT Workstation, at the upcoming SANS Digital Forensics and Incident Response Training Event in Monterey, Calif., March 5 – 10. SIFT 3.0 is a complete rebuild of the previous SIFT version and features the latest digital forensic tools available today. 


Oxygen Forensic Suite Targets Gang Crime

January 7, 2014 1:36 pm | by Oxygen Forensics, Inc. | Comments

Oxygen Forensic Suite 2014 v.6.0 targets gang offences greatly improving the analysis of multiple mobile devices within a case. New analysis options allow investigating interactions occurring among users of multiple mobile devices, while the improved Timeline view is now able to display all events occurring during a certain time period in a single view regardless of the number of mobile devices in the case.


BlackBerry to Create Security Tech Center in DC

January 7, 2014 9:59 am | by Charlie Osborne, ZDNet | Comments

BlackBerry CEO John Chen says the company plans to open a new security center in the U.S. to improve mobile security. Speaking at the CES Government (CESG) event in Las Vegas, Chen said the new "Security Innovation Center" will be established in Washington, D.C., and will "serve as a hub for collaboration with key government customers and other expert partners."


Dueling Surveillance Rulings Stir Legal Ripples

January 7, 2014 9:40 am | by Stephen Braun, Associated Press | Comments

Opposing court rulings on the National Security Agency's massive phone record surveillance — one threatening the program and the other supporting it — are stirring fast legal footwork as both cases start to wind their way through federal appeals courts and possibly to the Supreme Court.


Obama Said to Plan Intelligence Surveillance Reforms

January 7, 2014 9:17 am | by Christi Parsons, Los Angeles Times | Comments

President Obama is preparing a package of intelligence reforms that will probably put a public advocate for the first time in the secret court that approves surveillance practices and remove a controversial telephone records database from direct government control, aides said.


SANS Institute Announces its First All-digital Forensic and Incident Response Training Event

January 6, 2014 2:35 pm | by Sans | Comments

SANS Institute is bringing its most popular forensic courses together at one event with the introduction of the SANS Digital Forensics and Incident Response Training Event. This all-forensic event will take place in Monterey, Calif., March 5–10. SANS will also debut two new forensic courses at the event, FOR572: Advanced Network Forensics and Analysis and FOR585: Advanced Smartphone Forensics.


Wounded Veterans Work to Put Away Child Predators

January 6, 2014 9:54 am | by Kevin Freking, Associated Press | Comments

Oskar Zepeda has had pretty much one mission in his life: kill or capture. After serving nine tours of duty in Iraq and Afghanistan, he now has a new target — child predators. Zepeda, 29, is part of a 17-member class of veterans trained in computer forensics and sent to Immigration and Customs Enforcement field offices.


How the NSA (may have) Put a Backdoor in RSA's Cryptography: A Technical Primer

January 6, 2014 9:45 am | by Nick Sullivan, Ars Technica | Comments

There has been a lot of news lately about nefarious-sounding backdoors being inserted into cryptographic standards and toolkits. One algorithm, a pseudo-random bit generator, Dual_EC_DRBG, was ratified by the National Institute of Standards and Technology (NIST) in 2007 and is attracting a lot of attention for having a potential backdoor. 



You may login with either your assigned username or your e-mail address.
The password field is case sensitive.