Advertisement
News
Subscribe to DFI News
View Sample

SUBSCRIBE TO FREE
DFI News
EMAIL NEWSLETTER

Investigators, lawyers and forensic analysts who handle child-pornography cases

Haunted Digital Investigations

June 19, 2014 12:40 pm | by Jason Nark, Philadelphia Daily News | Comments

No matter what they do to decompress, the investigators, lawyers and forensic analysts who handle child-pornography cases say they can't outrun the first image they saw on the job, let alone the thousands of other horrors their eyes and ears have witnessed.

TOPICS:
Moscow-based Elcomsoft has developed a tool to collect iCloud backup files without knowing a person's Apple ID, a development intended to help law enforcement analyze seized computers.

Forensic Tool Snags iCloud Backups without Apple ID

June 19, 2014 12:11 pm | by Jeremy Kirk, InfoWorld | ElcomSoft Co., Ltd. | Comments

Moscow-based Elcomsoft has developed a tool to collect iCloud backup files without knowing a person's Apple ID, a development intended to help law enforcement analyze seized computers.                   

TOPICS:
A cheap brand of Chinese-made smartphones carried by major online retailers comes preinstalled with espionage software

Knock-off Smartfphone Sends Info Back to China

June 19, 2014 11:18 am | by Raphael Satter and Frank Jordans, Associated Press | Comments

A cheap brand of Chinese-made smartphones carried by major online retailers comes preinstalled with espionage software, a German security firm has said.                           

TOPICS:
Advertisement
Researchers have discovered a crucial security problem in Google Play, the official Android app store.

Google Play Apps Have Thousands of Secret Keys

June 19, 2014 10:34 am | by Columbia Univ. | Comments

Researchers have discovered a crucial security problem in Google Play, the official Android app store. Secret keys in their apps software, similar to usernames/passwords info, can be used by anyone to maliciously steal user data or resources from service providers.

TOPICS:
Companies that offer technologies for mobile forensics – the art of extracting digital evidence from smartphones – face a raft of challenges developing tools in today’s breakneck mobile device market.

Mobile Forensics Tools Hammer Out Evidence

June 19, 2014 8:13 am | by William Jackson, GCN | Comments

Companies that offer technologies for mobile forensics — the art of extracting digital evidence from smartphones — face a raft of challenges developing tools in today’s breakneck mobile device market.         

TOPICS:
The nationwide shortage of cybersecurity professionals — particularly for positions within the federal government — creates risks for national and homeland security, according to a new study from the RAND Corporation.

Shortage of Cybersecurity Professionals Poses Risk to National Security

June 19, 2014 8:13 am | by Rand Corporation | Comments

The nationwide shortage of cybersecurity professionals — particularly for positions within the federal government — creates risks for national and homeland security, according to a new study from the RAND Corporation.         

TOPICS:
Police officers from around the world serve on the Virtual Global Taskforce

Anti-pedophile Police Fight Child Porn 'Epidemic'

June 19, 2014 8:12 am | by Angus Crawford, BBC | Comments

The internet trade in images that show child sex abuse is now "an epidemic," according to the head of the global initiative to combat the problem. Police officers from around the world serve on the Virtual Global Taskforce.       

TOPICS:
A Tennessee man was arrested and charged with federal computer hacking for allegedly conspiring to launch cyber attacks on two universities and three companies since last summer

NullCrew Hacker Arrested for Cyber Attacks on Companies and Universities

June 19, 2014 8:11 am | by DOJ | Comments

A Tennessee man was arrested and charged with federal computer hacking for allegedly conspiring to launch cyber attacks on two universities and three companies since last summer, federal law enforcement officials have announced. The defendant is allegedly associated with a group of individuals, known as “NullCrew."

TOPICS:
Advertisement
University of New Haven students will join the national effort to combat cybercrime now that the university has become one of just 13 colleges nationwide, and the first in Connecticut, to form a partnership with the Defense Cyber Crime Center (DC3)

UNH Cyber Forensics Unit Partners with the DC3

June 17, 2014 2:55 pm | by Univ. of New Haven | Comments

University of New Haven students will join the national effort to combat cybercrime now that the university has become one of just 13 colleges nationwide, and the first in Connecticut, to form a partnership with the Defense Cyber Crime Center (DC3).

TOPICS:
Pittsburgh has become the arsenal of cybersecurity

Pittsburgh Cyber Squad Leads Way in Cybercrime Fight

June 17, 2014 1:39 pm | by Rich Lord and Albert Anderson, Pittsburgh Post-Gazette | Comments

Pittsburgh has become the arsenal of cybersecurity. It is home to CMU’s Software Engineering Institute with its 260-person CERT cyber team, and the FBI has placed a nonprofit training alliance here, assigning a data warrior to its helm.    

TOPICS:
The Army’s semi-annual, large-scale Network Integration Evaluation (NIE) saw the technology of network forensics make an impact at NIE 14.2, the latest NIE, which concluded earlier this month.

Network Forensics Makes an Impact at Army's NIE

June 17, 2014 1:17 pm | by Capt. Ray Ragan, DVIDS | Comments

The Army’s semi-annual, large-scale Network Integration Evaluation (NIE) saw the technology of network forensics make an impact at NIE 14.2, the latest NIE, which concluded earlier this month.                 

TOPICS:
The UK’s National Crime Agency has claimed that PC users have until midnight local time on Tuesday to clean their machines and improve defences against notorious malware GameoverZeus and CryptoLocker.

Midnight Deadline Approaches for GOZeus and CryptoLocker Victims

June 17, 2014 9:55 am | by Infosecurity | Comments

The UK’s National Crime Agency has claimed that PC users have until midnight local time on Tuesday to clean their machines and improve defences against notorious malware GameoverZeus and CryptoLocker.              

TOPICS:
The Bitcoin digital currency system is in danger of losing its credibility as an independent payment system because of the growing power of a group that runs some of the computers behind it.

Bitcoin Faces Threat of a Miner Takeover

June 17, 2014 9:44 am | by Peter Svensson, Associated Press | Comments

The Bitcoin digital currency system is in danger of losing its credibility as an independent payment system because of the growing power of a group that runs some of the computers behind it.                   

TOPICS:

Mobile Anti-Forensics

June 17, 2014 8:55 am | by Cory Doctorow, Boing Boing | Comments

In Android Anti-forensics: Modifying CyanogenMod, Karl-Johan Karlsson and William Bradley Glisson present a version of the Cyanogenmod alternate operating system for Android devices, modified so that it generates plausible false data to foil forensic analysis by law enforcement.

TOPICS:

Can Digital Forensics Keep Up with Smartphone Tech?

June 17, 2014 8:20 am | by William Jackson, GCN | Comments

The explosive growth in both the use and capacity of smartphones has led to a sea change in digital forensics, creating technology challenges for the justice and law enforcement communities and raising legal questions that in some cases have gone to the Supreme Court.

TOPICS:

Pages

X
You may login with either your assigned username or your e-mail address.
The password field is case sensitive.
Loading