Advertisement
News
Subscribe to DFI News
View Sample

SUBSCRIBE TO FREE
DFI News
EMAIL NEWSLETTER

A new, extremely persistent type of online tracking is shadowing visitors to thousands of top websites. This type of tracking, called canvas fingerprinting, works by instructing the visitor's Web browser to draw a hidden image. Because each computer draws

Meet the Online Tracking Device that is Virtually Impossible to Block

July 22, 2014 12:14 pm | by Julia Angwin, ProPublica | Comments

A new, extremely persistent type of online tracking is shadowing visitors to thousands of top websites. This type of tracking, called canvas fingerprinting, works by instructing the visitor's Web browser to draw a hidden image. Because each computer draws the image slightly differently, the images can be used to assign each user's device a number that uniquely identifies it.

TOPICS:
Speaking through an online link up from Russia at the Hope X hacker conference in New York, N.S.A. whistleblower Edward Snowden called on designers, developers and technologists across the globe to build communications systems which can shut out prying st

Snowden Urges Hackers to Make Spilling Secrets Safer

July 22, 2014 12:01 pm | by Infosecurity | Comments

Speaking through an online link up from Russia at the Hope X hacker conference in New York, N.S.A. whistleblower Edward Snowden called on designers, developers and technologists across the globe to build communications systems which can shut out prying state-sponsored surveillance.  

TOPICS:
A talk scheduled to be given at the upcoming Black Hat security conference has been cancelled. The talk would have explained how to identify users of the Internet privacy service Tor.

Black Hat Tor Talk Cancelled

July 22, 2014 11:19 am | by Joseph Menn, Reuters | Comments

A talk scheduled to be given at the upcoming Black Hat security conference has been cancelled. The talk would have explained how to identify users of the Internet privacy service Tor.                   

TOPICS:
Advertisement

Russia Caught Editing Wikipedia Entry about MH17

July 21, 2014 10:31 am | by Kadhim Shubber, Wired UK | Comments

Thanks to a Twitter bot that monitors Wikipedia edits made from Russian government IP addresses, someone from the All-Russia State Television and Radio Broadcasting Company (VGTRK) has been caught editing a Russian-language Wikipedia reference to MH17 in an article on aviation disasters.

TOPICS:

The Dangers of Social Media in the Military

July 21, 2014 9:59 am | by Lance Cpl. Tyler Giguere, DVIDS | Comments

Common tactics of social media extortionists include relating to a service member’s interests and posting pictures of attractive females to lure them into chats. What may seem like a normal person wanting to video chat or meet with a Marine, can actually be an extortionist trying to deceive him for his money or information.

TOPICS:

Computer Forensics Reveal Murderous Searches

July 21, 2014 9:04 am | by Andy Kravetz, Journal Star | Comments

Although they don’t have an eyewitness or the actual murder weapon, Peoria County, Illinois prosecutors believe they have the next best thing — a series of Internet searches on Nathan Leuthold’s computer about ways to kill someone.     

TOPICS:

Computer Forensics with P2 Commander

July 18, 2014 9:42 am | by Pranshu Bajpai, Infosec Institute | Comments

Computer Forensics is the methodical series of procedures and techniques used for procuring evidence from computer systems and storage media. This evidence can then be analyzed for relevant information that is to be presented in a court of law. Computer Forensics has frequently been listed as one of the most intriguing computer professions, however beginners may find themselves overwhelmed quickly.

TOPICS:

New York Proposes Restrictive Bitcoin Regulations

July 18, 2014 8:05 am | by Michael Virtanen, Associated Press | Comments

New York regulators have proposed establishing rules for firms involved in receiving, transmitting and storing virtual currency, as well as retail conversions. The proposal by the Department of Financial Services would establish a so-called BitLicense.

TOPICS:
Advertisement

How Elite Hackers (Almost) Stole the NASDAQ

July 18, 2014 8:04 am | by Dan Goodin, Ars Technica | Comments

In 2010, elite hackers, most likely from Russia, used at least two zero-day vulnerabilities to penetrate the computer network operated by Nasdaq Stock Market, a hack that allowed them to roam unmolested for months and plant destructive malware designed to cause disruptions, according to a media report.

TOPICS:

Senate Hearing Looks to Cybercrime Law to Fight Botnets

July 17, 2014 10:19 am | by Sara Peters, Dark Reading | Comments

In the wake of Microsoft's seizure of No-IP servers and domains, private and public sector representatives met to discuss what can be done to address the problem of botnets.                     

TOPICS:

World Cup Hackers Down Tools During FIFA Final

July 17, 2014 9:32 am | by Infosecurity | Comments

Cyber criminals may have upped their game during the FIFA World Cup 2014 tournament but malicious activity almost completely stopped during the final between Argentina and Germany on Sunday, according to researchers.         

TOPICS:

Approximate Matching Helps Digital Forensics Find Similar Artifacts

July 17, 2014 8:32 am | by Kim Mays, IT Business Edge | Comments

According to the National Institute of Standards and Technology, approximate matching is a technology that can be used in a variety of settings, including digital forensics, security monitoring and data filtering. It involves locating similarities among pieces of digital data to match objects that are alike or to find objects that contain other objects.

TOPICS:

GCHQ's Menu of Tools for Manipulating the Web

July 16, 2014 9:58 am | by Sean Gallagher, Ars Technica | Comments

What appears to be an internal Wiki page detailing the cyber weaponry used by the British spy agency GCHQ has been published by Glenn Greenwald of The Intercept. The page, taken from the documents obtained by former NSA contractor Edward Snowden, lists dozens of tools used by GCHQ to target individuals and their computing devices, spread disinformation posing as others, and “shape” opinion and information available online.

TOPICS:

Banks Often Don't Investigate Cyber Theft

July 16, 2014 9:34 am | by Infosecurity | Comments

With information theft on the rise, it turns out that banks and lenders almost always compensate their customers for fraudulent charges. However, a full half (52 percent) of financial institutions do so without conducting any kind of investigation into the issue. 

TOPICS:

Digital Crime-fighters Face Technical Challenges with Cloud Computing

July 15, 2014 3:55 pm | by NIST | Comments

The National Institute of Standards and Technology has issued for public review and comment a draft report summarizing 65 challenges that cloud computing poses to forensics investigators who uncover, gather, examine and interpret digital evidence to help solve crimes.

TOPICS:

Pages

X
You may login with either your assigned username or your e-mail address.
The password field is case sensitive.
Loading