Subscribe to DFI News
View Sample

DFI News

The sophisticated electronic components that are making modern cars safer, greener, and smarter are also making them dangerously vulnerable to cyber attacks.

Carmakers Ignore Hacking Risk

October 24, 2014 9:37 am | Comments

As high-tech features like adaptive cruise control, automatic braking and automatic parallel parking systems make cars smarter, it's also making them more vulnerable to hackers – a risk that an automotive security researcher says carmakers appear to be ignoring.


Microsoft PowerPoint as an Attack Vector

October 24, 2014 9:34 am | Comments

Microsoft is scrambling to issue a Windows update after security researchers discovered a flaw in PowerPoint that hackers are using to seize control of computers. Computer World reports that the security problem affects all of the currently supported releases of Windows. 

One should not expect to find all user information sitting in the default folder or default location for a given type of file (e.g. Application Data or similar folder). Searching the entire hard disk is required in order to locate all unencrypted log and

FAA Seeks App to Preserve Digital Evidence

October 23, 2014 12:01 pm | Comments

To help with the collection, management, protection and preservation of digital forensic evidence, the Federal Aviation Administration is turning to industry. In an Oct. 15 posting, the FAA said it's seeking a commercial off-the-shelf application that will create a remotely accessible depository where digital media analysts can store digital forensic evidence and distribute forensic workload among investigators.

Your medical information is worth 10 times more than your credit card number on the black market. Security experts say cyber criminals are increasingly targeting the $3 trillion U.S. healthcare industry, which has many companies still reliant on aging com

US Investigating Cybersecurity Flaws in Medical Devices

October 23, 2014 11:52 am | Comments

The U.S. Department of Homeland Security is investigating about two dozen cases of suspected cybersecurity flaws in medical devices and hospital equipment that officials fear could be exploited by hackers, a senior official at the agency told Reuters.

How are ex-military and ex-hackers different? For starters, security guys with a military background are more likely to have a “traditional career.” This typically includes a degree from a four-year university, a series of jobs with certifications, and fo

Americans Fear Hackers More than Guns

October 23, 2014 11:37 am | Comments

The poll of 1,500 Americans conducted by Chapman University in Orange, California, found that walking alone down a dark street is the situation that has Americans most fearful – beating the fear of identity theft in second place, and the fear of being unsafe online in third place.

In this blog post we'll be looking at a new type of malware for Android phones that encrypts important files and demands the user pay a ransom to regain access to their phone.

Android Images Can Conceal Code

October 22, 2014 11:12 am | Comments

Someone's found (yet) another nasty security flaw in Android, by crafting a way to pack malicious software to look like images. The good news is that disclosure was kept back until Google had put a fix in place; the bad news is, of course, the huge number of phone-owners who never update – either through choice, ignorance or that their handset-maker holds back upgrades.


Justice Department Expands Fight Against Cybercrime

October 22, 2014 11:08 am | Comments

The Justice Department is expanding its National Security division to take on threats to the country from state-sponsored economic espionage and cybercrime, assistant attorney general for national security John Carlin said Tuesday.


Canada to Deport Alleged Anonymous Hacker

October 22, 2014 10:40 am | Comments

Matt DeHart, an American who believes the United States is pursuing sham child-porn charges against him as cover for a national security investigation, has been ordered deported from Canada. The 30-year-old faces up to 25 years in prison if convicted of child pornography charges in Tennessee.


Cost of Cybercrime on the Rise

October 21, 2014 6:57 am | Comments

According to the 2014 Cost of Cyber Crime Study, the average annualized cost of cybercrime has reached $12.7 million in the U.S., a 96 percent increase since the study was launched five years ago.                    

While Android phones are constantly targeted by cyber criminals, the iPhone is considered more secure. Now, leaked documents from one of the world's leading surveillance companies have reaffirmed the idea.

Chinese Government Hacking iPhones?!?

October 21, 2014 6:54 am | Comments

Chinese authorities just launched “a malicious attack on Apple” that could capture user names and passwords of anyone who logs into the iCloud from anywhere in the country, the well-respected censorship watchdog reports. With that information, a hacker can view users contacts, photos, messages and personal information stored in the cloud.  

A two-stage financial attack has been discovered that targets multiple ATMs around the world, including Latin America, Europe and Asia, allowing attackers to remove money via direct manipulation and steal millions of dollars.

500 Million Financial Records Hacked over 12 Months

October 21, 2014 6:39 am | Comments

Federal officials warned companies Monday that hackers have stolen more than 500 million financial records over the past 12 months, essentially breaking into banks without ever entering a building.                                                                    


NetClean Helps UK Home Office Fight Child Abuse

October 21, 2014 6:21 am | Comments

NetClean has announced that it has successfully collaborated with its partners, Hubstream and L-3 ASA, to implement the first phase of the UK’s national Child Abuse Image Database (CAID). The CAID plays a key part in delivering on the UK government’s promise to create a central repository for consolidating data in cases of child sexual abuse material.


High Schools Add Cyber Security Curriculum

October 20, 2014 11:34 am | Comments

Staying abreast of global trends in the digital world, educators in Richmond and Co­lumbia counties are working to create new coursework that will train high school students to protect computer networks from security threats.              


Model Helps Set Up Police Sting to Catch Hacker

October 20, 2014 11:23 am | Comments

A hacker obtained nude photographs of a California model through Apple's iCloud and gave her two choices: pay up or have your private photos distributed to the world. The hacker reportedly bragged about hacking into celebrity accounts and leaking nude photos before demanding $900 from the model or else he'd 'ruin her modeling career.' 

Even as the U.S. Air Force Academy has reduced the number of majors it offers recently, it has instituted a new program aimed at helping the Air Force fly, fight and win in cyberspace.

GIAC Network Forensic Analyst Certification

October 20, 2014 11:13 am | Comments

A new forensics certification, the GIAC Network Forensic Analyst, validates that professionals who hold this credential are qualified to perform examinations employing network forensic artifact analysis and demonstrate an understanding of network forensics, normal and abnormal conditions for common network protocols, the process and tools used to examine device and system logs, wireless communication, and encryption protocols.



You may login with either your assigned username or your e-mail address.
The password field is case sensitive.