Advertisement
News
Subscribe to DFI News
View Sample

SUBSCRIBE TO FREE
DFI News
EMAIL NEWSLETTER

UA, UAPD to Create Cybercrime Lab

June 12, 2014 2:53 pm | by Univ. of Alabama | Comments

The University of Alabama’s department of criminal justice, in conjunction with The University of Alabama Police Department, recently received a $60,000 grant from the Alabama Department of Economic and Community Affairs to start a digital forensics crime lab at UA.

TOPICS:

XSS Flaw in TweetDeck Leads to Spread of Potential Exploits

June 12, 2014 10:22 am | by Tim Wilson, Dark Reading | Comments

A cross-site scripting bug in Twitter's TweetDeck tool caused trouble for many users, and potentially opened up many other users to XSS attacks.                              

TOPICS:

Ars Technica Tests Internet Surveillance

June 12, 2014 8:47 am | by Sean Gallagher, Ars Technica | Comments

Ars Technica's Sean Gallagher partnered with NPR tech correspondent Steve Henn for an experiment in Internet surveillance. For one week, while Henn researched a story, he allowed himself to be watched — acting as a stand-in, in effect, for everyone who uses Internet-connected devices. How much of our lives do we really reveal simply by going online?

TOPICS:
Advertisement

Guarding against 'Carmageddon' Cyber Attacks

June 11, 2014 3:52 pm | by David Salisbury, Vanderbilt Univ. | Comments

The tightly integrated computing and networking systems required to turn the nation’s freeways into “smart transportation systems” are currently under development. But they have a worrisome downside: They are vulnerable to cyber attacks by criminals, terrorists or hostile nations.

TOPICS:

Vegas Police Killer's Video and Social Media Investigated

June 11, 2014 11:52 am | by Michelle Rindels and Justin Pritchard, Associated Press | Comments

Investigators in Las Vegas are studying YouTube videos and a range of other social media posts by Jerad Miller, as they try to untangle what led him and his 22-year-old wife to gun down two police officers and a civilian before taking their own lives.

TOPICS:

Getting Smart about Fighting Cyber Crime

June 11, 2014 11:46 am | by Caitlin Dawson, Simon Fraser Univ. | Comments

When Ashleigh Girodat collects her BA in criminology in June she will have already made her mark in the fight against cyber crime. As part of a research team at SFU’s International Cybercrime Research Centre, Girodat analyses data from a web crawler that scans the open web for child-exploitation content.

TOPICS:

Cellebrite Wins Forensic 4:cast Awards for 6th Straight Year

June 11, 2014 11:24 am | Cellebrite | Comments

Cellebrite, developer and provider of mobile data forensic solutions, has announced that its Cellebrite UFED Touch has won the Forensic 4:cast Award for Phone Forensic Hardware of the Year, and its UFED Physical Analyzer has won Phone Forensic Software of the Year.

TOPICS:

Internet Giants Erect Barriers to Spy Agencies

June 10, 2014 11:25 am | by David Sanger and Nicole Perlroth, The New York Times | Comments

After years of cooperating with the government, the immediate goal now is to thwart Washington — as well as Beijing and Moscow. The strategy is also intended to preserve business overseas in places like Brazil and Germany that have threatened to entrust data only to local providers.

TOPICS:
Advertisement

NIST Updating Mobile Forensics Guidance

June 10, 2014 11:18 am | by Eric Chabrow, Gov Info Security | Comments

Apple unveiled the iPhone in June 2007, a month after the National Institute of Standards and Technology issued "Guidelines on Cell Phone Forensics." Seven years later, NIST is revising its guidance and giving it a new moniker, "Guidelines on Mobile Device Forensics."

TOPICS:

Chinese PLA Hacking Group Targets Aerospace Industry

June 10, 2014 10:21 am | by Dan Goodin, Ars Technica | Comments

Investigators said they have identified a secretive hacking group that has spent years systematically targeting US partners in the space and satellite industry, most likely on behalf of the Chinese military. The group, dubbed as Putter Panda, is connected to Unit 61486 of the People Liberation Army.       

TOPICS:

GODZILLA ATTACKS! Traffic Signs

June 9, 2014 10:15 am | by Jim Finkle, Reuters | Comments

After hackers played several high-profile pranks with traffic signs, including warning San Francisco drivers of a Godzilla attack, the U.S. government advised operators of electronic highway signs to take "defensive measures" to tighten security.

TOPICS:

Cyber Crime Costs Global Economy $445B

June 9, 2014 9:57 am | by Help Net Security | Comments

Cyber crime has a significant impact on economies worldwide. A new report from the Center for Strategic and International Studies (CSIS) concludes that cyber crime costs businesses approximately $445 billion worldwide, with an impact on approximately 150,000 jobs in the EU and 200,000 jobs in the U.S.

TOPICS:

Town Refuses to Pay Crypto Ransom for Police Computers

June 9, 2014 9:35 am | by Dan Goodin, Ars Technica | Comments

The town manager of a hamlet in south eastern New Hampshire has defied demands that he pay a ransom to recover police department computer files taken hostage by Cryptowall, a newer piece of malware that encrypts hard drive contents of infected machines until victims pay for them to be decrypted.

TOPICS:

German Spy Agency Comes Clean on Secret Sites

June 6, 2014 9:53 am | by Frank Jordans, Associated Press | Comments

Germany's foreign intelligence agency has officially lifted the lid on some of its worst-kept secrets, acknowledging that half a dozen facilities around the country are in fact spy stations — as anyone with Internet access could already figure out.

TOPICS:

Queen Proposes Life Sentences for Hackers

June 6, 2014 9:43 am | by Tom Brewster, the Guardian | Comments

The UK government has said it wants to hand out life sentences to anyone found guilty of a cyber attack that has a catastrophic effect, under plans announced in the Queen's speech.                   

TOPICS:

Pages

X
You may login with either your assigned username or your e-mail address.
The password field is case sensitive.
Loading