Subscribe to DFI News
View Sample

DFI News

Approximate Matching Helps Digital Forensics Find Similar Artifacts

July 17, 2014 8:32 am | by Kim Mays, IT Business Edge | Comments

According to the National Institute of Standards and Technology, approximate matching is a technology that can be used in a variety of settings, including digital forensics, security monitoring and data filtering. It involves locating similarities among pieces of digital data to match objects that are alike or to find objects that contain other objects.


GCHQ's Menu of Tools for Manipulating the Web

July 16, 2014 9:58 am | by Sean Gallagher, Ars Technica | Comments

What appears to be an internal Wiki page detailing the cyber weaponry used by the British spy agency GCHQ has been published by Glenn Greenwald of The Intercept. The page, taken from the documents obtained by former NSA contractor Edward Snowden, lists dozens of tools used by GCHQ to target individuals and their computing devices, spread disinformation posing as others, and “shape” opinion and information available online.


Banks Often Don't Investigate Cyber Theft

July 16, 2014 9:34 am | by Infosecurity | Comments

With information theft on the rise, it turns out that banks and lenders almost always compensate their customers for fraudulent charges. However, a full half (52 percent) of financial institutions do so without conducting any kind of investigation into the issue. 


Digital Crime-fighters Face Technical Challenges with Cloud Computing

July 15, 2014 3:55 pm | by NIST | Comments

The National Institute of Standards and Technology has issued for public review and comment a draft report summarizing 65 challenges that cloud computing poses to forensics investigators who uncover, gather, examine and interpret digital evidence to help solve crimes.


Google Forms Zero-day Hacking Team

July 15, 2014 11:12 am | by Kelly Jackson Higgins, Dark Reading | Comments

Google has revealed a new white-hat security team it has formed that will root out vulnerabilities in all software that touches the Internet. Google has revealed a new white-hat security team it has formed that will root out vulnerabilities in all software that touches the Internet.


CNET Attacked by Russian Hacker Group

July 15, 2014 10:50 am | by Seth Rosenblatt, CNET | Comments

A Russian hacker group that has attacked some of the biggest news and business sites in the world claims it penetrated CNET's website over the weekend and stole a database of registered reader data.               


NIST Report on Cryptography Expertise and Standards

July 15, 2014 9:38 am | by NIST | Comments

The National Institute of Standards and Technology (NIST)'s primary external advisory board has released a report calling for the agency to increase its staff of cryptography experts and implement more explicit processes for ensuring openness and transparency to strengthen its cryptography efforts.


Insurers Try to Get a Grip on Growing Cyber Risk Market

July 14, 2014 11:05 am | by Leigh Thomas and Jim Finkle, Reuters | Comments

Insurers are eagerly eyeing exponential growth in the tiny cyber coverage market but their lack of experience and skills handling hackers and data breaches may keep their ambitions in check.                 


FBI Cyber Expert Fights Real-world Crime

July 14, 2014 10:51 am | by Joe Mankak, Associated Press | Comments

J. Keith Mularski's world has expanded greatly since he stopped selling discount furniture to join the FBI in 1998. Especially since he transferred from Washington, D.C., in 2005 to fill a vacancy in the Pittsburgh field office's cyber squad — which he now heads.


Chinese Man Hacks Military Data from US Computers

July 14, 2014 10:32 am | by Julia Watson, Associated Press | Comments

U.S. authorities have charged a Chinese businessman with hacking into the computer systems of U.S. companies with large defense contracts, including Boeing, to steal data on military projects, including some of the latest fighter jets, officials have said.


Global Law Enforcement, Security Firms Team Up, Take Down Shylock

July 11, 2014 11:21 am | by Sara Peters, Dark Reading | Comments

A month after the GameOver ZeuS sting, another bank fraud group's operations has been disrupted by an international collaboration of security firms and law enforcement agencies. The new target is Shylock, a Trojan that has stolen from banks in the U.S., Italy, and especially the United Kingdom.


China Says iPhone is a Threat to National Security

July 11, 2014 11:04 am | by Reuters | Comments

Chinese state media has branded Apple Inc's iPhone a threat to national security because of the smartphone's ability to track and time-stamp user locations.                           


US and UK Consumers Avoid Pirated Content

July 11, 2014 9:55 am | by Infosecurity | Comments

Illegally obtaining TV and movies is almost endemic in the Asia-Pacific region though.                                               


Computer Forensics Key in Hot Car Child Death Case

July 10, 2014 9:26 am | Comments

Justin Ross Harris is charged with felony murder and second-degree child cruelty in the death of his son, Cooper. He claims that he forgot to drop his son off at daycare before heading to work. Cooper Harris spent nearly seven hours in the SUV as temperatures rose to 88 degrees. Computer forensics will be key in the case as police uncovered Harris' sexting and penchant for videos about death from his computers.  


Follow Malware's Tracks to Thwart Cyber Attacks

July 10, 2014 8:51 am | by Jason Brvenik, GCN | Comments

To defeat malware, government agencies need to determine how threats entered a network and where they went once inside. But this relatively simple task is complicated by attackers’ ability to cover their tracks and to do so over an extended period of time.



You may login with either your assigned username or your e-mail address.
The password field is case sensitive.