Advertisement
News
Subscribe to DFI News
View Sample

SUBSCRIBE TO FREE
DFI News
EMAIL NEWSLETTER

The Most Dangerous Man in Bitcoin isn't a Criminal

March 4, 2014 10:58 am | by Max Chafkin, Fast Company | Comments

Preet Bharara and his staff are learning how to think about prosecutions in a whole new way. What's in question are the real-life identities of cloaked criminals.                         

TOPICS:

Zeus Retrieves Attack Info Hidden in Sunset and Cat Pictures

March 4, 2014 10:18 am | by Zeljka Zorz, Help Net Security | Comments

Malware peddlers employing a new Zeus banking Trojan variant have resorted to hiding the malware's configuration file into innocuous-looking sunset and cat photos.                         

TOPICS:

Snow Leopard: The Next Windows XP?

March 4, 2014 9:47 am | by Maxim Weinstein, Dark Reading | Comments

If Windows XP is the dinosaur in the room, then OS X Snow Leopard — despite being named after a predator — is more like a sitting duck.                                 

TOPICS:
Advertisement

Malware Rates Linked to Socio-economic Factors

March 4, 2014 9:17 am | by Warwick Ashford, Computer Weekly | Comments

Regional cyber vulnerabilities are not linked to any single factor, but to a variety of different socio-economic factors.                                     

TOPICS:

Hackers Hold Meetup.com for $300 Ransom

March 3, 2014 3:52 pm | by Reuters | Comments

Social networking website Meetup.com is fighting a sustained battle against cyber attackers who are demanding only $300 to call off a campaign that has kept the site offline for much of the past four days.             

TOPICS:

Cyber Report on US Utilities

March 3, 2014 10:19 am | by Ayesha Rascoe, Reuters | Comments

U.S. utilities would benefit from an independent group to set industry-wide guidelines on combating cyber threats, according to a think-tank report that was co-authored by a former director of the Central Intelligence Agency.       

TOPICS:

Hidden 'Signature' in Online Photos Could Help Nab Child Abusers

March 3, 2014 10:03 am | by Wendy Grossman, Scientific American | Comments

Police may soon have a new way to catch pedophiles who distribute child abuse photos anonymously online. The technology could also identify smartphone thieves who take pictures with the stolen gadgets and then post their snapshots on the Internet.

TOPICS:

Florida Cops' Secret Weapon: Warrantless Cell Phone Tracking

March 3, 2014 9:45 am | by Kim Zetter, Wired | Comments

Police in Florida have offered a startling excuse for having used a controversial “stingray” cell phone tracking gadget 200 times without ever telling a judge: the device’s manufacturer made them sign a non-disclosure agreement that they say prevented them from telling the courts.

TOPICS:
Advertisement

Sears: Hack or Hysteria?

March 3, 2014 9:40 am | by Infosecurity | Comments

Bloomberg has reported that US retail giant Sears "is investigating a possible security breach after a series of cyber attacks on other retailers have exposed the data of millions of consumers."               

TOPICS:

Texas Appeals Court Says Police Can't Search Someone's Phone after being Jailed

February 28, 2014 9:34 am | by Megan Geuss, Ars Technica | Comments

The Texas Court of Criminal Appeals has ruled that law enforcement officials do need a warrant to search an arrested person's cell phone after they've been jailed. The ruling did not decide whether it is legal or not for police to search a suspect's phone at theincidence of arrest, which is currently a hotly contested subject. The Supreme Court is set to decide that matter later this year.

TOPICS:

Mt. Gox: Rise and Fall into Bankruptcy

February 28, 2014 9:08 am | by Brett Wolf and Emily Flitter, Reuters | Comments

Mt. Gox filed for bankruptcy on Friday but bitcoin insiders say its downfall began nearly a year ago as the virtual currency exchange tangled with regulators, split from former business partners and grappled with cyber attacks.       

TOPICS:

Cellebrite Reveals Top Trends Shaping Mobile Forensics

February 27, 2014 3:11 pm | by Cellebrite | Comments

Cellebrite, a leading provider of mobile forensic and mobile data transfer solutions, shares its industry forecast of top trends shaping mobile forensics this year. Cellebrite surveyed its customer base and conducted interviews with leading mobile forensic experts and analysts spanning the industry.

TOPICS:

FBI Director Asks Private Sector to Share More Cyber Intelligence at RSA 2014

February 27, 2014 10:34 am | by Infosecurity | Comments

James Comey, the recently confirmed FBI director, said that addressing cybersecurity issues effectively can only be done through increased cooperation with law enforcement and the collective efforts and wisdom of the commercial information security community

TOPICS:

More than 100 Flavors Of Malware Stealing Bitcoins

February 27, 2014 10:05 am | by Kelly Jackson Higgins, Dark Reading | Comments

For just $35, you can buy a popular, specialized malware tool that steals Bitcoins and other such electronic currency — and researchers have unearthed more than 100 different malware families that specialize in this form of theft.     

TOPICS:

US Attorney Subpoenaed Mt Gox, Other Bitcoin Businesses

February 27, 2014 9:30 am | by Emily Flitter, Reuters | Comments

Manhattan U.S. Attorney Preet Bharara has sent subpoenas to Mt. Gox, other bitcoin exchanges, and businesses that deal in bitcoin to seek information on how they handled recent cyber attacks, a source familiar with the probe said on Wednesday. 

TOPICS:

Pages

X
You may login with either your assigned username or your e-mail address.
The password field is case sensitive.
Loading