Subscribe to DFI News
View Sample

DFI News

Dominos Pizza Customers Exposed after Massive Data Breach

June 16, 2014 9:51 am | by Infosecurity | Comments

Hackers have threatened to expose the details of over 600,000 Dominos Pizza customers after hacking the firm’s website.                                     


P.F. Chang's Turns to Old-style Card Reading

June 16, 2014 9:39 am | by Dan Goodin, Ars Technica | Comments

US restaurant chain P.F. Chang's China Bistro plans to temporarily bring back manual credit card imprinting while it investigates a security breach that allowed hackers to steal customer payment card data from multiple stores.       


US Marshals to Auction Off Silk Road Bitcoins

June 13, 2014 10:54 am | by Reuters | Comments

The U.S. government plans to auction about 30,000 bitcoin, the electronic currency, valued at about $17.4 million, on June 27 the U.S. Marshals Service said. The bitcoin were seized during an FBI raid in October on the Internet marketplace Silk Road, known as a hub for transactions involving illegal drugs and criminal activities.                           


Man Charged in Bush Family Email Hack

June 13, 2014 10:43 am | by Jessica Greska, Associated Press | Comments

A Romanian man is facing charges that he hacked into Facebook and email accounts of former high-ranking U.S. government officials and a relative of two former presidents.                       


Cyber Attacks Take Hours to Detect

June 13, 2014 10:33 am | by CSG International | Comments

More than one-third of cyber attacks take hours to detect. Even more alarming, resolving breaches takes days, weeks, and in some cases, even months.                             


UA, UAPD to Create Cybercrime Lab

June 12, 2014 2:53 pm | by Univ. of Alabama | Comments

The University of Alabama’s department of criminal justice, in conjunction with The University of Alabama Police Department, recently received a $60,000 grant from the Alabama Department of Economic and Community Affairs to start a digital forensics crime lab at UA.


XSS Flaw in TweetDeck Leads to Spread of Potential Exploits

June 12, 2014 10:22 am | by Tim Wilson, Dark Reading | Comments

A cross-site scripting bug in Twitter's TweetDeck tool caused trouble for many users, and potentially opened up many other users to XSS attacks.                              


Ars Technica Tests Internet Surveillance

June 12, 2014 8:47 am | by Sean Gallagher, Ars Technica | Comments

Ars Technica's Sean Gallagher partnered with NPR tech correspondent Steve Henn for an experiment in Internet surveillance. For one week, while Henn researched a story, he allowed himself to be watched — acting as a stand-in, in effect, for everyone who uses Internet-connected devices. How much of our lives do we really reveal simply by going online?


Guarding against 'Carmageddon' Cyber Attacks

June 11, 2014 3:52 pm | by David Salisbury, Vanderbilt Univ. | Comments

The tightly integrated computing and networking systems required to turn the nation’s freeways into “smart transportation systems” are currently under development. But they have a worrisome downside: They are vulnerable to cyber attacks by criminals, terrorists or hostile nations.


Vegas Police Killer's Video and Social Media Investigated

June 11, 2014 11:52 am | by Michelle Rindels and Justin Pritchard, Associated Press | Comments

Investigators in Las Vegas are studying YouTube videos and a range of other social media posts by Jerad Miller, as they try to untangle what led him and his 22-year-old wife to gun down two police officers and a civilian before taking their own lives.


Getting Smart about Fighting Cyber Crime

June 11, 2014 11:46 am | by Caitlin Dawson, Simon Fraser Univ. | Comments

When Ashleigh Girodat collects her BA in criminology in June she will have already made her mark in the fight against cyber crime. As part of a research team at SFU’s International Cybercrime Research Centre, Girodat analyses data from a web crawler that scans the open web for child-exploitation content.


Cellebrite Wins Forensic 4:cast Awards for 6th Straight Year

June 11, 2014 11:24 am | Cellebrite | Comments

Cellebrite, developer and provider of mobile data forensic solutions, has announced that its Cellebrite UFED Touch has won the Forensic 4:cast Award for Phone Forensic Hardware of the Year, and its UFED Physical Analyzer has won Phone Forensic Software of the Year.


Internet Giants Erect Barriers to Spy Agencies

June 10, 2014 11:25 am | by David Sanger and Nicole Perlroth, The New York Times | Comments

After years of cooperating with the government, the immediate goal now is to thwart Washington — as well as Beijing and Moscow. The strategy is also intended to preserve business overseas in places like Brazil and Germany that have threatened to entrust data only to local providers.


NIST Updating Mobile Forensics Guidance

June 10, 2014 11:18 am | by Eric Chabrow, Gov Info Security | Comments

Apple unveiled the iPhone in June 2007, a month after the National Institute of Standards and Technology issued "Guidelines on Cell Phone Forensics." Seven years later, NIST is revising its guidance and giving it a new moniker, "Guidelines on Mobile Device Forensics."


Chinese PLA Hacking Group Targets Aerospace Industry

June 10, 2014 10:21 am | by Dan Goodin, Ars Technica | Comments

Investigators said they have identified a secretive hacking group that has spent years systematically targeting US partners in the space and satellite industry, most likely on behalf of the Chinese military. The group, dubbed as Putter Panda, is connected to Unit 61486 of the People Liberation Army.       



You may login with either your assigned username or your e-mail address.
The password field is case sensitive.