Advertisement
Network Forensics
Subscribe to Network Forensics

The Lead

Fake Peoria Mayor Twitter Account Prompts Raid

April 18, 2014 10:28 am | by Associated Press | News | Comments

Police officers trying to find out who was behind a fake Twitter account set up in the name of Peoria's mayor have raided a home, seizing computers and phones and hauling several people in to be questioned.             

Pedophiles Lured by Avatar in Tech Industry Porn Fight

April 16, 2014 11:02 am | by Kristen Schweizer, Bloomberg | News | Comments

Sweetie looks much like other unfortunate young Filipinas. But unlike her peers, Sweetie is a...

Ropin' in Facebook, Twitter, LinkedIn

April 11, 2014 8:54 am | by Gary Torgersen | Articles | Comments

Each social media platform is different, with unique code and variations. Each one runs on its...

Botnets Hide in Mobile Dating App

April 7, 2014 11:15 am | by Infosecurity | News | Comments

A series of bots have invaded the Android version of dating app Tinder, and are spreading...

View Sample

SUBSCRIBE TO FREE DFI News EMAIL NEWSLETTER

Controlling Social Media Rumors During a Disaster or Terrorist Attack

April 4, 2014 10:59 am | by Warwick Business School | News | Comments

Authorities around the world should set up emergency communication teams to manage the amount of misinformation circulating on social media during disasters, terrorist attacks and other social crises.              

Android Botnet Targets Middle East Banks

April 3, 2014 9:27 am | by Editor | Blogs | Comments

I recently encountered a botnet targeting Android smartphone users who bank at financial institutions in the Middle East. The crude yet remarkably effective mobile bot that powers this whole operation comes disguised as one of several online banking apps, has infected more than 2,700 phones, and has intercepted at least 28,000 text messages.  

Why a Twitter Account May be More Valuable Than a Credit Card

March 28, 2014 9:58 am | by Michael Callahan | Blogs | Comments

Twitter accounts can cost more to purchase than a stolen credit card because an individual’s account credentials potentially have a greater yield.                             

Advertisement

Is data privacy more important than ever?

March 28, 2014 9:23 am | by Mark Stockley | Blogs | Comments

A recent post points out that the Facebook generation are increasingly putting their lives online — posting information about who they are, where they are, what they're doing and who they're with — the very information that organizations often go to great lengths to protect.

Analysis Finds 28 Internet DDoS Occur Every Hour

March 27, 2014 11:17 am | by NSFOCUS | News | Comments

NSFOCUS has released its DDoS Threat Report 2013, which details attack trends and methodologies over the past year. The report expands on the top 10 findings released in February to include statistical analysis and key observations based on the 244,703 DDoS incidents. 

Is data privacy an out of date concept?

March 27, 2014 10:20 am | by John Bryan | Blogs | Comments

So are we trying to protect privacy based on past social values? Are we old-fashioned in trying to keep a lid on the social media generation?                               

Zorenium Bot on Your iPhone

March 25, 2014 9:27 am | by Infosecurity | News | Comments

A new bot with the name Zorenium has landed in the criminal underground, with the ability to target Apple iOS devices like iPhone and iPad. It's not widely known, nor is it widely detectable.                 

Turkey Blocks Twitter

March 21, 2014 11:14 am | by Orchan Coskun, Reuters | News | Comments

Turkey's courts have blocked access to Twitter days before elections as Prime Minister Tayyip Erdogan battles a corruption scandal that has seen social media platforms awash with alleged evidence of government wrongdoing.        

Advertisement

Investigator Turns Eyewitness

March 21, 2014 8:21 am | by Benjamin Wright | Articles | Comments

In today’s world of social media, investigators are taking on a new role; they are becoming a form of eyewitness. As the eyewitness, an investigator observes evidence that might not be visible to any other available investigator. The investigator is wise to create a record of what he or she sees at any particular point in time, including print outs of screenshots.  

DHS Digs Out 27,000-member Child Abuse Ring Buried on Tor

March 19, 2014 4:55 pm | by Lisa Vaas | Blogs | Comments

The US has busted a massive child abuse image ring running on the Darknet's Onion router, aka Tor.                                           

New Victims Caught in Botnet Using ColdFusion Websites

March 17, 2014 4:10 pm | by Dan Goodin, Ars Technica | News | Comments

Investigators have identified more victims of a botnet that collects payment card data and other sensitive information by preying on websites running poorly secured installations of Adobe's ColdFusion Web server platform.        

UN Denies that Syria Image was Faked

March 12, 2014 4:02 pm | by Rick Gladstone, The New York Times | News | Comments

A United Nations photograph showing a sea of hungry Palestinians awaiting emergency food amid the detritus of their bomb-ravaged neighborhood near Damascus has been retweeted more than eight million times in the past few weeks, becoming such an arresting image of the Syrian civil war that some blogosphere skeptics have suggested that it was digitally faked.

Online Sleuthing by Mt Gox Dispossessed Throws up Few Clues

March 6, 2014 9:33 am | by Jeremy Wagstaff, Reuters | News | Comments

Some of those who have lost bitcoins in the collapse of Mt. Gox have turned to internet sleuthing to find out where their money has gone — but they're unlikely to have much luck.                 

Advertisement

Hidden 'Signature' in Online Photos Could Help Nab Child Abusers

March 3, 2014 10:03 am | by Wendy Grossman, Scientific American | News | Comments

Police may soon have a new way to catch pedophiles who distribute child abuse photos anonymously online. The technology could also identify smartphone thieves who take pictures with the stolen gadgets and then post their snapshots on the Internet.

New Attack Bypasses Microsoft Zero-day Protection App

February 24, 2014 3:35 pm | by Dan Goodin, Ars Technica | News | Comments

Researchers have developed attack code that completely bypasses Microsoft's zero-day prevention software, an impressive feat that suggests criminal hackers are able to do the same thing when exploiting vulnerabilities that allow them to surreptitiously install malware.

'Pony' Botnet Steals Bitcoins, Digital Currencies

February 24, 2014 3:20 pm | by Jim Finkle, Reuters | News | Comments

Cyber criminals have infected hundreds of thousands of computers with a virus called "Pony" to steal bitcoins and other digital currencies, in the most ambitious cyber attack on virtual money uncovered so far, according to security firm Trustwave.

Wounded Warriors Take on Child Porn in HERO Program

February 24, 2014 9:33 am | by Paul Guzzo, The Tampa Tribune | News | Comments

Men who have seen and suffered the horrors of combat steel themselves each day for a job some find just as wrenching: fighting child sex crimes back home.                            

Namecheap's DNS Server Hit with Big, New DDoS

February 21, 2014 10:11 am | by Zeljka Zorz, Help Net Security | News | Comments

Popular domain registrar and web hosting service Namecheap has been having trouble with an unexpected DDoS attack targeting 300 or so domains on two of their DNS nameservers.                   

Abusing Cloud Services For Cyber Crime

February 19, 2014 2:20 pm | by Brian Prince, Dark Reading | News | Comments

Building a botnet typically involves infecting a PC. But at the upcoming RSA Conference, two researchers plan to show how to build one with free cloud services.                         

Biggest DDoS Ever Aimed at Cloudflare's Content Delivery Network

February 11, 2014 4:35 pm | by Sean Gallagher, Ars Technica | News | Comments

A distributed denial-of-service attack targeting a client of the content delivery network Cloudflare reached new highs in malicious traffic today, striking at the company’s data centers in Europe and the US. According to a Twitter post by Cloudflare CEO Matthew Prince, the full volume of the attack exceeded 400 gigabits per second—making it the largest DDoS attack ever recorded.

DDoS Attack Toolkit Enables DNS Servers

February 11, 2014 10:20 am | by Prolexic Technologies | News | Comments

Prolexic Technologies has issued a high alert DDoS attack threat advisory on the DNS Flooder v1.1 toolkit. The toolkit makes it faster and easier for malicious actors to launch crippling reflection attacks and will likely be widely adopted in the DDoS-as-a-Service market, potentially increasing the number of attacks.

Microsoft Takes to the Front Lines in the War on Cyber Crime

February 7, 2014 10:16 am | by Edward Jones, Entrepreneur | News | Comments

Stepping up to fight the cyber war, Microsoft unveiled a new state of the art Cybercrime Center specifically designed to battle botnets, malware and other various forms of internet crime. Inside its new headquarters, Microsoft’s Digital Crimes Unit (DCU) is actively disrupting some of the most serious cybercrime threats currently facing modern society. 

Java-based Malware Driving DDoS Botnet Infects Windows, Mac, Linux Devices

January 29, 2014 10:21 am | by Dan Goodin, Ars Technica | News | Comments

Researchers have uncovered a piece of botnet malware that is capable of infecting computers running Windows, Mac OS X, and Linux that have Oracle's Java software framework installed. The cross-platform HEUR:Backdoor.Java.Agent.a, takes hold of computers by exploiting CVE-2013-2465, a critical Java vulnerability that Oracle patched in June.

DDoS Won't Die

January 29, 2014 9:39 am | by Kelly Jackson Higgins, Dark Reading | News | Comments

It's one of the more crude and old-school cyber attacks, but the distributed denial-of-service (DDoS) attack just keeps getting stronger, faster, and harder to deflect: new data shows the largest attack last year registered three times the volume of DDoS attacks in previous years, and attacks against SSL-protected websites jumped nearly 20 percent.

SpyEye Trojan Author Pleads Guilty

January 29, 2014 9:14 am | by Infosecurity | News | Comments

Aleksandr Andreevich Panin, aka "Gribodemon" and "Harderman," has pled guilty to charges accusing him of being the primary developer and distributor of the SpyEye banking trojan, according to the FBI. SpyEye, a derivative of Zeus was, before his arrest in July 2013, the world's foremost banking malware, having infected a reputed 1.4 million computers.

X
You may login with either your assigned username or your e-mail address.
The password field is case sensitive.
Loading