Advertisement
News
Subscribe to DFI News
View Sample

SUBSCRIBE TO FREE
DFI News
EMAIL NEWSLETTER

A cheap brand of Chinese-made smartphones carried by major online retailers comes preinstalled with espionage software

Knock-off Smartfphone Sends Info Back to China

June 19, 2014 11:18 am | by Raphael Satter and Frank Jordans, Associated Press | Comments

A cheap brand of Chinese-made smartphones carried by major online retailers comes preinstalled with espionage software, a German security firm has said.                           

TOPICS:
Researchers have discovered a crucial security problem in Google Play, the official Android app store.

Google Play Apps Have Thousands of Secret Keys

June 19, 2014 10:34 am | by Columbia Univ. | Comments

Researchers have discovered a crucial security problem in Google Play, the official Android app store. Secret keys in their apps software, similar to usernames/passwords info, can be used by anyone to maliciously steal user data or resources from service providers.

TOPICS:
Companies that offer technologies for mobile forensics – the art of extracting digital evidence from smartphones – face a raft of challenges developing tools in today’s breakneck mobile device market.

Mobile Forensics Tools Hammer Out Evidence

June 19, 2014 8:13 am | by William Jackson, GCN | Comments

Companies that offer technologies for mobile forensics — the art of extracting digital evidence from smartphones — face a raft of challenges developing tools in today’s breakneck mobile device market.         

TOPICS:
Advertisement
The nationwide shortage of cybersecurity professionals — particularly for positions within the federal government — creates risks for national and homeland security, according to a new study from the RAND Corporation.

Shortage of Cybersecurity Professionals Poses Risk to National Security

June 19, 2014 8:13 am | by Rand Corporation | Comments

The nationwide shortage of cybersecurity professionals — particularly for positions within the federal government — creates risks for national and homeland security, according to a new study from the RAND Corporation.         

TOPICS:
Police officers from around the world serve on the Virtual Global Taskforce

Anti-pedophile Police Fight Child Porn 'Epidemic'

June 19, 2014 8:12 am | by Angus Crawford, BBC | Comments

The internet trade in images that show child sex abuse is now "an epidemic," according to the head of the global initiative to combat the problem. Police officers from around the world serve on the Virtual Global Taskforce.       

TOPICS:
A Tennessee man was arrested and charged with federal computer hacking for allegedly conspiring to launch cyber attacks on two universities and three companies since last summer

NullCrew Hacker Arrested for Cyber Attacks on Companies and Universities

June 19, 2014 8:11 am | by DOJ | Comments

A Tennessee man was arrested and charged with federal computer hacking for allegedly conspiring to launch cyber attacks on two universities and three companies since last summer, federal law enforcement officials have announced. The defendant is allegedly associated with a group of individuals, known as “NullCrew."

TOPICS:
University of New Haven students will join the national effort to combat cybercrime now that the university has become one of just 13 colleges nationwide, and the first in Connecticut, to form a partnership with the Defense Cyber Crime Center (DC3)

UNH Cyber Forensics Unit Partners with the DC3

June 17, 2014 2:55 pm | by Univ. of New Haven | Comments

University of New Haven students will join the national effort to combat cybercrime now that the university has become one of just 13 colleges nationwide, and the first in Connecticut, to form a partnership with the Defense Cyber Crime Center (DC3).

TOPICS:
Pittsburgh has become the arsenal of cybersecurity

Pittsburgh Cyber Squad Leads Way in Cybercrime Fight

June 17, 2014 1:39 pm | by Rich Lord and Albert Anderson, Pittsburgh Post-Gazette | Comments

Pittsburgh has become the arsenal of cybersecurity. It is home to CMU’s Software Engineering Institute with its 260-person CERT cyber team, and the FBI has placed a nonprofit training alliance here, assigning a data warrior to its helm.    

TOPICS:
Advertisement
The Army’s semi-annual, large-scale Network Integration Evaluation (NIE) saw the technology of network forensics make an impact at NIE 14.2, the latest NIE, which concluded earlier this month.

Network Forensics Makes an Impact at Army's NIE

June 17, 2014 1:17 pm | by Capt. Ray Ragan, DVIDS | Comments

The Army’s semi-annual, large-scale Network Integration Evaluation (NIE) saw the technology of network forensics make an impact at NIE 14.2, the latest NIE, which concluded earlier this month.                 

TOPICS:
The UK’s National Crime Agency has claimed that PC users have until midnight local time on Tuesday to clean their machines and improve defences against notorious malware GameoverZeus and CryptoLocker.

Midnight Deadline Approaches for GOZeus and CryptoLocker Victims

June 17, 2014 9:55 am | by Infosecurity | Comments

The UK’s National Crime Agency has claimed that PC users have until midnight local time on Tuesday to clean their machines and improve defences against notorious malware GameoverZeus and CryptoLocker.              

TOPICS:
The Bitcoin digital currency system is in danger of losing its credibility as an independent payment system because of the growing power of a group that runs some of the computers behind it.

Bitcoin Faces Threat of a Miner Takeover

June 17, 2014 9:44 am | by Peter Svensson, Associated Press | Comments

The Bitcoin digital currency system is in danger of losing its credibility as an independent payment system because of the growing power of a group that runs some of the computers behind it.                   

TOPICS:

Mobile Anti-Forensics

June 17, 2014 8:55 am | by Cory Doctorow, Boing Boing | Comments

In Android Anti-forensics: Modifying CyanogenMod, Karl-Johan Karlsson and William Bradley Glisson present a version of the Cyanogenmod alternate operating system for Android devices, modified so that it generates plausible false data to foil forensic analysis by law enforcement.

TOPICS:

Can Digital Forensics Keep Up with Smartphone Tech?

June 17, 2014 8:20 am | by William Jackson, GCN | Comments

The explosive growth in both the use and capacity of smartphones has led to a sea change in digital forensics, creating technology challenges for the justice and law enforcement communities and raising legal questions that in some cases have gone to the Supreme Court.

TOPICS:

Smartphones before the Court: Searchable Wallets or Pocket PCs?

June 16, 2014 10:16 am | by William Jackson, GCN | Comments

Smartphones contain a wealth of information that can translate into evidence in civil and criminal court cases, and law enforcement agencies increasingly are mining this data in their investigations. Which raises the question, how much access should police have to the personal data contained on smartphones?

TOPICS:

Keeping Track of Time in Cyber-Physical Systems

June 16, 2014 10:04 am | by The National Science Foundation | Comments

The National Science Foundation (NSF) has announced a five-year, $4 million award to tackle the challenge of synchronizing time in cyber-physical systems (CPS) — systems that integrate sensing, computation, control and networking into physical objects and infrastructure.

TOPICS:

Pages

X
You may login with either your assigned username or your e-mail address.
The password field is case sensitive.
Loading