Subscribe to DFI News
View Sample

DFI News

Three Questions to Ask about Mobile Device Evidence

March 12, 2014 9:44 am | by Christa Miller, | Comments

Accessing all the data in a single smartphone can be as painstaking as processing thousands of fingerprints at a crime scene, but rather than isolating the prints you know from those you don’t, thousands of irrelevant text messages or call logs can simply muddy the waters of an investigation.  


Crime-fighting Chief Wants Geekier Police

March 11, 2014 3:26 pm | by Olivia Solon, Wired UK | Comments

The police need to attract and retain people with high-end technical skills in order to provide law enforcement for the digital age, according to Andy Archibald, head of the UK's National Crime Agency.             


Snowden Says Encryption Works

March 11, 2014 10:02 am | by Kelly Jackson Higgins, Dark Reading | Comments

Snowden, the former National Security Agency contractor who accessed and leaked reams of classified documents detailing NSA surveillance programs, answered questions as part of a panel hosted by American Civil Liberties Union executives at the South by Southwest conference in Austin, Texas.


Fraudulent Tax Returns Net $4 Billion for Cyber Criminals

March 11, 2014 9:51 am | by ThreatMetrix | Comments

ThreatMetrix explains the risks consumers face during tax season and strategies to protect taxpayer identities, especially when filing online returns. Of all potentially fraudulent tax returns, 93 percent are filed online, asserting the heightened need for preventative cybersecurity measures to protect tax e-filing.


With Russia and Ukraine, is all really quiet on the cyber front?

March 11, 2014 9:37 am | by Keir Giles Mar, Ars Technica | Comments

Reports in recent days of cyber incidents involving Russia and Ukraine are largely unconfirmed and inconsistent. The scale and frequency of website defacements — of the kind the Russian government broadcaster RT reported over a week ago — is barely distinguishable from the ordinary background noise of hostile activity against any high-profile site.


Police Investigate Possible Selfie on Stolen iPad

March 10, 2014 11:08 am | by Associated Press | Comments

Police investigating a burglary in Colorado are searching for a man who they believe snapped a selfie with an iPad reported stolen from a gymnastics studio.                           


Cybercrime-as-a-service Sold in the Dark Web

March 10, 2014 10:44 am | by | Comments

Cyber Criminals are settling into a comfortable place in the "Dark Web" where they test, refine and distribute malware for online thievery.                               


Hackers Claim Mt Gox CEO Fraud

March 10, 2014 10:18 am | by Andy Greenberg, Forbes | Comments

Hackers took over the Reddit account and personal blog of Mark Karpeles, Mt. Gox’s CEO, to post an angry screed alleging that the exchange he ran had actually kept at least some of the bitcoins that the company had said were stolen from users. 


Latvia Establishes Cyber Defence Unit

March 10, 2014 9:25 am | by Zeljka Zorz, Help Net Security | Comments

With the current situation in Ukraine, and Russian hackers' penchant for escalating minor and major disputes and conflicts their nation has with neighboring countries into the cyber realm, it's no wonder that Latvia has launched a Cyber Defence Unit.


Snake Cyber Attacks Target Ukraine's Government

March 10, 2014 9:15 am | by David Sanger and Steven Erlanger, The New York Times | Comments

Since the first major protests in Kiev that triggered the current crisis with Moscow, American intelligence agencies have been on high alert for cyber attacks aimed at the new government in Ukraine. They were a bit late: the attacks started long before President Viktor F. Yanukovych was forced from office.


Elite Security Posse Fostered Founders of WhatsApp, Napster

March 7, 2014 10:23 am | by Joseph Menn, Reuters | Comments

A few days after selling WhatsApp to Facebook for $19 billion, Jan Koum stepped into a suite at the St. Regis Hotel in San Francisco to celebrate with old friends, including CEOs, reformed hackers and a few people who fell into both those camps.


Tor Anonymity and Hidden Services Attracts Cyber Criminals

March 7, 2014 9:58 am | by Zeljka Zorz, Help Net Security | Comments

Initially created to help political dissidents bypass traffic restrictions and hide their online activity from authoritarian governments, the Tor anonymity network has long since become a great tool for cyber crooks to hide their criminal activities and infrastructure.


Man Said to Create Bitcoin Denies It

March 7, 2014 9:44 am | by Ryan Nakashima, Associated Press | Comments

Dorian Prentice Satoshi Nakamoto said Thursday that he is not the creator of bitcoin, adding further mystery to the story of how the world's most popular digital currency came to be.                   


Scientist-devised Crypto Attack Could One Day Steal Secret Bitcoin Keys

March 6, 2014 4:54 pm | by Dan Goodin, Ars Technica | Comments

Exposing a previously unknown weakness in the cryptographic system securing bitcoins, scientists have devised an attack that can steal large amounts of the digital currency when hackers run even unprivileged software on the same computer processing the coins.


American Career Aspirations Do Not Include Cybersecurity

March 6, 2014 10:44 am | by Infosecurity | Comments

The worldwide cybersecurity skills shortage is well-documented; and many countries have developed programs to fill the gap. These programs usually try to instill interest in schools, or tempt IT professionals into a career in security.    



You may login with either your assigned username or your e-mail address.
The password field is case sensitive.