Advertisement
News
Subscribe to DFI News
View Sample

SUBSCRIBE TO FREE
DFI News
EMAIL NEWSLETTER

Nuix has appointed experienced digital forensics investigator Chris Pogue as Senior Vice President for Cyber Threat Analysis.

Nuix Appoints Digital Forensics and Incident Response Expert

June 24, 2014 4:36 pm | Nuix | Comments

Nuix has appointed experienced digital forensics investigator Chris Pogue as Senior Vice President for Cyber Threat Analysis. Pogue brings experience with Trustwave SpiderLabs, the IBM/ISS X-Force incident response and ethical hacking teams and the US Army Signal Corps to Nuix’s growing cybersecurity team.

TOPICS:
Law enforcement agencies across the globe are taking a page out of the cybercriminal handbook, using targets' own phones and computers to spy on them with methods traditionally associated with the world's most malicious hackers

Experts Reveal Police Hacking Methods

June 24, 2014 4:08 pm | by Raphael Satter, Associated Press | Comments

Law enforcement agencies across the globe are taking a page out of the cybercriminal handbook, using targets' own phones and computers to spy on them with methods traditionally associated with the world's most malicious hackers, two computer security groups say.

TOPICS:
Complaints originating from social media make up "at least half" of calls passed on to front-line officers

Social Media Calls Passed to Front-line Police in UK

June 24, 2014 12:43 pm | by Keith Moore, BBC | Comments

Complaints originating from social media make up "at least half" of calls passed on to front-line officers, a senior officer has told the BBC.                               

TOPICS:
Advertisement
InfoSec teams should expand their rapid incident detection and response capabilities to mobile devices that have access to sensitive data.

Mobile Security Needs Incident Readiness

June 24, 2014 11:47 am | by AccessData | Comments

AccessData and Gigaom Research have released a report on the growing complexities of mobile security and the limitations of “preventive, policy-driven” solutions that are not designed to detect and respond to mobile security incidents that bypass defenses.

TOPICS:
Newly Observed Domains (NOD), a new set of data solutions that provide real-time actionable insights on young domain names.

Farsight Security Launches at the FIRST Conference in Boston

June 24, 2014 11:17 am | by Farsight Security, Inc. | Comments

Farsight Security, Inc., has emerged from stealth mode at the FIRST Conference in Boston, Massachusetts to debut Newly Observed Domains (NOD), a new set of data solutions that provide real-time actionable insights on young domain names.   

TOPICS:

Reuters Hacked via Taboola Ad

June 23, 2014 9:49 am | Comments

The website of the news agency Reuters has been hacked by the Syrian Electronic Army (SEA) again - condemning the news site for publishing "false" articles about Syria. The SEA reportedly corrupted Taboola web ads on Reuters articles to redirect traffic to a page under the hackers' control.

TOPICS:

Penetration Testing: A Hands-On Introduction to Hacking

June 23, 2014 9:38 am | by Sandra Henry-Stocker | Comments

Just recently published by no starch press, Penetration Testing: A Hands-On Introduction to Hacking can give you a solid -- practical, useful and insightful -- understanding of how hackers work and how you can use the same methods and tools to guard your systems against attack. 

TOPICS:

Fight Over Child Porn Evidence Pits Prosecutors Against Former Detective

June 23, 2014 9:20 am | Comments

The four words float through a messy criminal case, two contentious lawsuits and multiple appeals to the Washington State Supreme Court filed over the past three years. “We can’t see her.” The four words refer to an ugly photo: one frame in an infamous series of child pornography images, familiar to those who collect them like baseball cards.

TOPICS:
Advertisement

Cybersecurity Center Earns DHS, NSA Designation

June 23, 2014 9:04 am | Comments

Kansas State University's cybersecurity center is receiving national recognition for its dedication to cutting-edge research. The university's Center for Information and Systems Assurance has been redesignated as a National Center of Academic Excellence in Information Assurance/Cyber Defense Research. The designation is from the U.S. Department of Homeland Security and the National Security Agency and is effective from 2014 to 2019.

TOPICS:

Network Forensics Makes an Impact at the Army’s NIE

June 23, 2014 8:56 am | by Capt. Ray Ragan | Comments

The U.S. Army Electronic Proving Ground traditionally provides expertise in instrumentation for technology-based systems and is the Army’s designated tester for C4ISR systems, as part of the Army Test and Evaluation Command. This year, in addition to supporting with instrumentation, USAEPG brought a network forensics team to the technology-centric field evaluation.

TOPICS:
Investigators, lawyers and forensic analysts who handle child-pornography cases

Haunted Digital Investigations

June 19, 2014 12:40 pm | by Jason Nark, Philadelphia Daily News | Comments

No matter what they do to decompress, the investigators, lawyers and forensic analysts who handle child-pornography cases say they can't outrun the first image they saw on the job, let alone the thousands of other horrors their eyes and ears have witnessed.

TOPICS:
Moscow-based Elcomsoft has developed a tool to collect iCloud backup files without knowing a person's Apple ID, a development intended to help law enforcement analyze seized computers.

Forensic Tool Snags iCloud Backups without Apple ID

June 19, 2014 12:11 pm | by Jeremy Kirk, InfoWorld | ElcomSoft Co., Ltd. | Comments

Moscow-based Elcomsoft has developed a tool to collect iCloud backup files without knowing a person's Apple ID, a development intended to help law enforcement analyze seized computers.                   

TOPICS:
A cheap brand of Chinese-made smartphones carried by major online retailers comes preinstalled with espionage software

Knock-off Smartfphone Sends Info Back to China

June 19, 2014 11:18 am | by Raphael Satter and Frank Jordans, Associated Press | Comments

A cheap brand of Chinese-made smartphones carried by major online retailers comes preinstalled with espionage software, a German security firm has said.                           

TOPICS:
Researchers have discovered a crucial security problem in Google Play, the official Android app store.

Google Play Apps Have Thousands of Secret Keys

June 19, 2014 10:34 am | by Columbia Univ. | Comments

Researchers have discovered a crucial security problem in Google Play, the official Android app store. Secret keys in their apps software, similar to usernames/passwords info, can be used by anyone to maliciously steal user data or resources from service providers.

TOPICS:
Companies that offer technologies for mobile forensics – the art of extracting digital evidence from smartphones – face a raft of challenges developing tools in today’s breakneck mobile device market.

Mobile Forensics Tools Hammer Out Evidence

June 19, 2014 8:13 am | by William Jackson, GCN | Comments

Companies that offer technologies for mobile forensics — the art of extracting digital evidence from smartphones — face a raft of challenges developing tools in today’s breakneck mobile device market.         

TOPICS:

Pages

X
You may login with either your assigned username or your e-mail address.
The password field is case sensitive.
Loading