Subscribe to DFI News
View Sample

DFI News

Google Enhances Encryption Technology for Email

March 21, 2014 8:58 am | by Eileen Sullivan, Associated Press | Comments

Google has enhanced the encryption technology for its flagship email service in ways that will make it harder for the National Security Agency to intercept messages moving among the company's worldwide data centers.          


Global Attack Needed to Catch Credit Thieves

March 21, 2014 8:11 am | by Michigan State Univ. | Comments

Stopping massive data breaches like the one that hit Target will require a more sophisticated, collaborative approach by law enforcement agencies around the world, a Michigan State University cyber security expert argues.        


California Targeted by Cyber Gangs

March 20, 2014 10:47 am | by Don Thomson, Associated Press | Comments

International criminal enterprises follow the money, and a report being released Thursday says they are increasingly focusing on California because of its wealth and innovation.                     


Full Disclosure Mailing List Closes

March 20, 2014 10:34 am | by Help Net Security | Comments

The Full Disclosure mailing list has long been the perfect place for security researchers to disclose and discuss newly found vulnerabilities. But John Cartwright, one of its creators, has pulled the plug on the list.         

Darlloz Targets Intel Architecture to Mine Digital Currency

March 20, 2014 10:27 am | by Charlie Osborne, ZDNet | Comments

A Linux worm variant found in the wild targets routers, set-top boxes, and now PCs in order to mine for cryptocurrency.                                     


Tech Giants Knew of NSA Data Collection

March 20, 2014 10:19 am | by Spencer Ackerman, the Guardian | Comments

The senior lawyer for the National Security Agency has stated unequivocally that US technology companies were fully aware of the surveillance agency’s widespread collection of data, contradicting months of angry denials from the firms. 


Malaysia, FBI Probing Data from Pilot's Simulator

March 19, 2014 12:49 pm | by Ian Mader, Associated Press | Comments

Malaysian investigators — with the help of the FBI — are trying to restore files deleted last month from the home flight simulator of the pilot aboard the missing Malaysia Airlines plane to see if they shed any light on the disappearance, officials said Wednesday.


Microsoft Forcasts Cost of Cyber Crime

March 19, 2014 11:58 am | by David Finn, Microsoft | Comments

A new study from Microsoft’s Digital Crimes Unit reaffirms that cyber crime is a booming business for organized crime groups all over the world.                              


WhatsApp Says It Will Maintain Users' Privacy Despite Facebook's Takeover

March 19, 2014 11:06 am | by Infosecurity | Comments

WhatsApp has always been high profile because of its success (450 million users and, at least before the takeover, growing fast). But since it was bought by Facebook for $19 billion, it has been placed under a direct spotlight. Concerns are that its historic value on user privacy will be usurped by Facebook's business model of selling what it knows to advertisers.


Windigo Infects Linux Servers to Spam Millions

March 19, 2014 10:44 am | by Dan Goodin, Ars Technica | Comments

Researchers have documented an ongoing criminal operation infecting more than 10,000 Unix and Linux servers with malware that sends spam and redirects end users to malicious Web pages.                   


Trustwave Acquires Cenzic

March 19, 2014 10:24 am | by Trustwave | Comments

Trustwave has aquired Cenzic, Inc. The acquisition brings together Cenzic's dynamic application security testing technologies with Trustwave's cloud-based application, database and network penetration testing and scanning services.     


Correction to Product Insight: Remote Forensic Acquisition Using Hardware Tools

March 18, 2014 11:45 am | Comments

An article in the Winter/Spring edition of DFI News digital edition incorrectly positioned the capabilities of the Tableau TD3 Forensic Imaging System. DFI News regrets the error.             

The Role of the Forensic Accountant

March 18, 2014 9:33 am | by Randall Jackson, Computerworld | Comments

The question is raised of what is the forensic accountant, what do they do, and how does that differ from computer forensic and the whole cyber crime specialist?                         


Men from Ukraine and New York Indicted in US Cybercrime Case

March 18, 2014 9:08 am | by Jonathan Stempel, Reuters | Comments

Federal prosecutors have indicted three men they accuse of being members of an international cybercrime ring that tried to steal at least $15 million by hacking into U.S. customer accounts at 14 financial institutions and the Department of Defense's payroll service.


New Victims Caught in Botnet Using ColdFusion Websites

March 17, 2014 4:10 pm | by Dan Goodin, Ars Technica | Comments

Investigators have identified more victims of a botnet that collects payment card data and other sensitive information by preying on websites running poorly secured installations of Adobe's ColdFusion Web server platform.        



You may login with either your assigned username or your e-mail address.
The password field is case sensitive.