Subscribe to DFI News
View Sample

DFI News

Phishing Scam Targets US Marshals Service Bitcoin Auction List

July 7, 2014 10:10 am | Comments

Individuals on the recipients list of the leaked US Marshals Service email to Silk Road auction enquirers are being targeted in a phishing attack, and at least one individual has fallen for the scam. Several individuals on the list received phishing emails from the same source. However, not all the individuals on the leaked email recipients list were targeted.


Smartphones Can Still Be Searched by Border Cops

July 7, 2014 9:57 am | Comments

The Supreme Court released a landmark unanimous ruling last Wednesday limiting the ability of police officers to search a suspect's cellphone. But don't expect the Supreme Court's limitations to impact all law enforcement, because, as Aaron Sankin detailed on the Daily Dot, the United States Customs and Border Protection (CBP) still don't need to consult with a judge before browsing through your smartphone.


Child Rape Case Leaves Mysteries

July 2, 2014 1:46 pm | by Mitch Weiss, Ray Henry and Kate Brumback, Associated Press | Comments

Matthew Coniglio's Georgia home held a trove of child pornography, more than 50,000 images and videos stored on laptops, external hard drives and thumb drives.                         


Cybercrime Scheme Aims at Payments in Brazil

July 2, 2014 1:27 pm | by Nicole Perlroth, The New York Times | Comments

Security researchers have uncovered what they believe is a significant cybercrime operation in Brazil that took aim at $3.75 billion in transactions by Brazilians. Even half of that value was redirected to criminals, the scope of the swindle would eclipse any other previous electronic theft.


Physical Location of Data Will Become Increasingly Irrelevant

July 2, 2014 12:44 pm | by Gartner | Comments

The physical location of data still matters, but will become increasingly irrelevant and will be replaced by a combination of legal location, political location and logical location in most organizations by 2020, according to a report from Gartner, Inc.


Supreme Court Cites NIST Mobile Forensics Guide in Ruling on Cell Phone Searches

July 2, 2014 12:20 pm | by NIST | Comments

In considering the question of cell phone searches by police without a warrant, the Supreme Court ruling in Riley v California had to mesh established policy on search warrants together with an understanding of cell phone technology. To help with that challenge, the justices turned to a variety of sources, among them the NIST Guidelines on Mobile Device Forensics


Cybercrooks Breed Self-Cloning Mutant That Steals Your Bank Details

July 2, 2014 8:38 am | by John Leyden, the Register | Comments

Cybercrooks have put together a botnet client which bundles in worm-like functionality that gives it the potential to spread quickly. Seculert warns that the latest version of the Cridex (AKA Geodo) information stealing Trojan includes a self-spreading infection method.


When Does Virtual Crime Become An Actual Crime?

July 2, 2014 8:18 am | Comments

In his mind and online persona, Gilberto Valle left little doubt about the depths of his depravation: In communications over the Internet, he imagined subjecting women he knew to sex-related torture and, in some cases, murder and cannibalism. However, the judge concluded that Mr. Valle’s Internet plotting had been “fantasy role play” and was not evidence of an actual crime.


US to Ask China to Restart Cyber Working Group

July 1, 2014 12:20 pm | by Matthew Pennington, Associated Press | Comments

The United States wants to restart a cybersecurity working group that China shut down after the U.S. indicted five Chinese military officers on charges of hacking into American companies' computers to steal trade secrets.        


Active Malware Operation Let Attackers Sabotage US Energy Industry

July 1, 2014 11:48 am | by Dan Goodin, Ars Technica | Comments

Researchers have uncovered a malware campaign that gave attackers the ability to sabotage the operations of energy grid owners, electricity generation firms, petroleum pipelines, and industrial equipment providers.          


Microsoft Sues to Seize Domains Responsible for Malware Infections

July 1, 2014 11:40 am | by Ericka Chickowski, Dark Reading | Comments

After detecting more than 7.4 million infections among its customers by the Jenxcus and Bladabindi worms, Microsoft kicked off legal action to disrupt these pervasive malware threats.                   


The Frontier of Cloud Forensics

July 1, 2014 11:23 am | by William Jackson, GCN | Comments

Cloud computing helps to make data more accessible, but the same technologies that make it readily available — on-demand provisioning, reprovisioning and virtual environments — also can obscure it. This is creating new challenges for digital forensics, complicating incident response and criminal and civil investigations into incidents and data in the cloud.


New N.S.A. Chief Calls Damage From Snowden Leaks Manageable

June 30, 2014 10:19 am | Comments

The newly installed director of the National Security Agency says that while he has seen some terrorist groups alter their communications to avoid surveillance techniques revealed by Edward J. Snowden, the damage done over all by a year of revelations does not lead him to the conclusion that “the sky is falling.”


California Authorities Arrest 275 Child Predators

June 30, 2014 10:05 am | by Tami Abdollah, Associated Press | Comments

A monthlong national effort to capture sex predators led to 275 arrests in Southern California that included a teaching assistant for special needs kids, a retired sheriff's deputy and a U.S. Army soldier. The effort dubbed "Operation Broken Heart" involved dozens of local, state and federal authorities throughout the month of May who targeted sex offenders, child sex traffickers, pimps, child porn traders and sex tourists traveling abroad.


Rebekah Brooks Vindicated by Hacking Acquittal

June 30, 2014 5:31 am | by Jill Lawless, Associated Press | Comments

Former News of the World editor Rebekah Brooks said Thursday she is innocent ofphone hacking and other crimes and feels vindicated by a jury's unanimous decision to acquit her. The ex-tabloid editor made her first public statement since being cleared after an eight-month trial on charges of conspiring to hack phones, bribe officials and obstruct police.



You may login with either your assigned username or your e-mail address.
The password field is case sensitive.