Subscribe to DFI News
View Sample

DFI News

Radio Tactics Signs Global Partnership with Wynyard Group

March 17, 2014 3:36 pm | by Radio Tactics | Comments

Radio Tactics has signed a partnership agreement with Wynyard Group, a New Zealand based provider of critical threat assessment and advanced crime analytics software.                        


LightOut is Latest Cyber Threat to Target Energy Sector

March 17, 2014 10:51 am | by Infosecurity | Comments

What happens when the energy grid goes down? Well the lights, of course, go out. A fresh advanced persistent threat (APT) targeting the energy sector is thus aptly named LightsOut, and like previous attacks, it used a watering hole method to start its system compromise.


Online Attacks Hit Russian State

March 17, 2014 10:33 am | by David Meyer, GigaOM | Comments

Russian state and media websites have been hit by a wave of denial-of-service attacks. The attacks followed the blockage of several major Russian media outlets at the order of the Kremlin.                 


NATO Websites Hit in Cyber Attack Linked to Crimea Tension

March 17, 2014 10:21 am | by Adrian Croft and Peter Apps, Reuters | Comments

Hackers brought down several public NATO websites, the alliance said on Sunday, in what appeared to be the latest escalation in cyberspace over growing tensions over Crimea.                      


The Three A's of Mobile Device Preservation

March 17, 2014 9:35 am | by Peter Coons, D4 eDiscovery | Comments

There are so many applications and so much data on mobile devices that trying to ask the right question can sometimes be tricky.                                   


AccessData Announces First Recipients of the Forensic Endowment Program

March 17, 2014 9:16 am | by AccessData | AccessData Group | Comments

AccessData has announced the first recipients of the AccessData Forensic Endowment Program (ADFEP) honoring the Mississippi Gulf Coast Cyber Crimes Task Force and the City of Glendale, Arizona Police Department.           


Tackling Insider Cyber Threats Requires a Credible Digital Forensic Strategy

March 14, 2014 10:41 am | by the Guardian | Comments

As organizations brace themselves for another year of heightened cybersecurity threats, a risk much closer to home may pose a greater challenge.                              


Exchange CEOs Say They are on High Cybersecurity Alert

March 14, 2014 10:15 am | by John McCrank, Reuters | Comments

Cybersecurity is emerging as one of the biggest threats for exchange operators as hackers become more sophisticated in their efforts to disrupt the global financial system, a group of exchange leaders told an industry conference.     


NSA Will Not Infect 'Millions' Of Machines

March 14, 2014 9:49 am | by Kelly Jackson Higgins, Dark Reading | Comments

The National Security Agency (NSA) has shot down as "inaccurate" a new press report that the agency has potentially planted malware on potentially millions of computers worldwide and even impersonated Facebook and other websites to lure potential targets.


Volunteers Reveal Info in Metadata Study

March 13, 2014 9:48 am | by Cyrus Farivar, Ars Technica | Comments

Since November 2013, researchers at Stanford University have been asking: What’s in your metadata?                                           


Whatsapp Flaw Could Reveal Past Conversations

March 13, 2014 9:35 am | by Zeljka Zorz, Help Net Security | Comments

A new Whatsapp flaw that allows any other applications on your Android device to exfiltrate and decrypt past Whatsapp conversations has been discovered and revealed by security consultant Bas Bosschert.              


Retail Industry Mulls Forming Its Own ISAC for Intel-sharing

March 12, 2014 5:04 pm | by Kelly Jackson Higgins, Dark Reading | Comments

The massive data breach at Target, along with a wave of other attacks on retailers that has come to light in the past few months, has turned up the heat on the retail sector to formalize intelligence sharing on threats and attacks on the industry.


Worm that Wreaked Havoc for US Military Likely a Progenitor of Red October

March 12, 2014 4:44 pm | by Infosecurity | Comments

More than a year ago, Kaspersky Labs analyzed dozens of modules used by Red October, an extremely sophisticated cyber-espionage operation that has been at work in dozens of high-profile targets. New analysis shows that one of its genetic progenitors is likely Agent.btz, a long-running, data-collecting worm believed to have been developed by Russian special services.


UN Denies that Syria Image was Faked

March 12, 2014 4:02 pm | by Rick Gladstone, The New York Times | Comments

A United Nations photograph showing a sea of hungry Palestinians awaiting emergency food amid the detritus of their bomb-ravaged neighborhood near Damascus has been retweeted more than eight million times in the past few weeks, becoming such an arresting image of the Syrian civil war that some blogosphere skeptics have suggested that it was digitally faked.


How CIA Snooped on Senate Intel Committee's Files

March 12, 2014 10:37 am | by Sean Gallagher, Ars Technica | Comments

As part of an agreement to share data with the staff of the Senate Select Committee on Intelligence on its controversial detention and interrogation program, the CIA leased a space and hired contractors to run a top-secret network, which it filled with millions of pages of documents dumped from the agency’s internal network.



You may login with either your assigned username or your e-mail address.
The password field is case sensitive.