Advertisement
Topics
Subscribe to Topics

The Lead

Can You Ask the Court to Order a Party to Follow the Duty to Preserve?

October 21, 2014 8:52 am | by Joshua Gilliland, Esq. | Blogs | Comments

There are no shortage of cases where the duty to preserve has gotten attorneys and parties a like in trouble. However, it is difficult to ask a Court to order a party to “follow the rules,” because the party already has a duty to so. However, if there is evidence of wrongdoing by the party that was subject to the duty to preserve, the outcome could be different.

Cost of Cybercrime on the Rise

October 21, 2014 6:57 am | News | Comments

According to the 2014 Cost of Cyber Crime Study, the average annualized cost of cybercrime...

Chinese Government Hacking iPhones?!?

October 21, 2014 6:54 am | News | Comments

Chinese authorities...

500 Million Financial Records Hacked over 12 Months

October 21, 2014 6:39 am | News | Comments

Federal officials warned companies Monday that hackers have stolen more than 500 million...

View Sample

SUBSCRIBE TO FREE DFI News EMAIL NEWSLETTER

NetClean Helps UK Home Office Fight Child Abuse

October 21, 2014 6:21 am | News | Comments

NetClean has announced that it has successfully collaborated with its partners, Hubstream and L-3 ASA, to implement the first phase of the UK’s national Child Abuse Image Database (CAID). The CAID plays a key part in delivering on the UK government’s promise to create a central repository for consolidating data in cases of child sexual abuse material.

Investigator Turns Eyewitness

October 20, 2014 8:21 pm | by Benjamin Wright | Articles | Comments

In today’s world of social media, investigators are taking on a new role; they are becoming a form of eyewitness. As the eyewitness, an investigator observes evidence that might not be visible to any other available investigator. The investigator is wise to create a record of what he or she sees at any particular point in time, including print outs of screenshots.  

High Schools Add Cyber Security Curriculum

October 20, 2014 11:34 am | News | Comments

Staying abreast of global trends in the digital world, educators in Richmond and Co­lumbia counties are working to create new coursework that will train high school students to protect computer networks from security threats.              

Advertisement

Can Apple Pay Thwart the Credit Card Hacking Trend?

October 20, 2014 11:27 am | by Evan Niu | Blogs | Comments

Over the past year or so, we've seen some of the most pervasive and widespread credit card security breaches at many of the nation's largest retailers. With Apple's new Apple Pay service launching on Monday alongside a slew of security features, it comes at the perfect time.  

Model Helps Set Up Police Sting to Catch Hacker

October 20, 2014 11:23 am | News | Comments

A hacker obtained nude photographs of a California model through Apple's iCloud and gave her two choices: pay up or have your private photos distributed to the world. The hacker reportedly bragged about hacking into celebrity accounts and leaking nude photos before demanding $900 from the model or else he'd 'ruin her modeling career.' 

Jasper Duplicator Series

October 20, 2014 11:18 am | Addonics Technologies | Product Releases | Comments

Addonics Technologies announced the Jupiter series of drive duplicators that, unlike traditional duplicators designed for a fixed number of targets, allow you to connect multiple units together. The Jasper Duplicator offers high performance 150 MB/sec copy speed depending on the read/write speed of the source and target media. 

Even as the U.S. Air Force Academy has reduced the number of majors it offers recently, it has instituted a new program aimed at helping the Air Force fly, fight and win in cyberspace.

GIAC Network Forensic Analyst Certification

October 20, 2014 11:13 am | News | Comments

A new forensics certification, the GIAC Network Forensic Analyst, validates that professionals who hold this credential are qualified to perform examinations employing network forensic artifact analysis and demonstrate an understanding of network forensics, normal and abnormal conditions for common network protocols, the process and tools used to examine device and system logs, wireless communication, and encryption protocols.

Old Phone Fraud Finds New Life in VOIP

October 20, 2014 11:06 am | News | Comments

Bob Foreman’s architecture firm was the victim of an age-old fraud that has found new life now that most corporate phone lines run over the Internet. Hackers had broken into the phone network of the company, Foreman Seeley Fountain Architecture, and routed $166,000 worth of calls from the firm to premium-rate telephone numbers in Gambia, Somalia and the Maldives.

Advertisement
Businesses of all sizes seem to be moving at least some operations to the cloud. It’s only a matter of time before you get a phone call asking you to conduct some kind of cloud forensics and/or incident response.

Forensics in the Amazon Cloud

October 17, 2014 10:19 am | by Editor | Blogs | Comments

Businesses of all sizes seem to be moving at least some operations to the cloud. It’s only a matter of time before you get a phone call asking you to conduct some kind of cloud forensics and/or incident response.           

Security researchers have warned of a serious security flaw in Android which could potentially leave every device open to attack.

Binder Could Blow Apart Android Security

October 17, 2014 10:03 am | by Phil Muncaster, Infosecurity Magazine | News | Comments

Security researchers have warned of a serious security flaw in Android which could potentially leave every device open to attack.                                 

US-CERT released an advisory warning users about email scams and cyber campaigns using the Ebola virus disease as a theme.

Beware Ebola-themed Phishing, Malware and Hoaxes

October 17, 2014 9:53 am | by Zeljka Zorz, Help Net Security | News | Comments

US-CERT released an advisory warning users about email scams and cyber campaigns using the Ebola virus disease as a theme.                                     

A surge in malware disguised as online advertisements aimed at unsuspecting web users has hit major U.S. military contractors in the past few weeks, marking a dangerous twist on a decade-old scourge for advertisers, security researchers say.

Malvertising Targets US Military Firms

October 17, 2014 9:42 am | by Eric Auchard, Reuters | News | Comments

A surge in malware disguised as online advertisements aimed at unsuspecting web users has hit major U.S. military contractors in the past few weeks, marking a dangerous twist on a decade-old scourge for advertisers, security researchers say.   

FBI Director Warns Cellphone Encryption Will Harm Investigation

October 17, 2014 9:12 am | by Eric Tucker and Jack Gillum, Associated Press | News | Comments

FBI Director James Comey has warned in stark terms against the push by technology companies to encrypt smartphone data and operating systems, arguing that murder cases could be stalled, suspects could walk free and justice could be thwarted by a locked phone or an encrypted hard drive.

Advertisement

Who? What? When? Why? Where? And How?

October 17, 2014 8:13 am | by Brett Shavers | Articles | Comments

A key factor in placing any person at the scene of a crime is obtaining evidence that can place an identified suspect as it relates to the scene of the crime. Previously discussed methods of physical surveillance and obtaining records are usually the best evidence of placing a suspect at a specific place and at a specific time, but as most investigations involve reacting to incidents, this may not be always possible.

Admins of sites that run Drupal 7 are advised to update to the latest version of the platform — version 7.32 — because it fixes a critical SQL injection vulnerability that can ultimately lead to site hijacking and data theft.

Drupal Bug Opens Up Websites to Attack

October 16, 2014 11:25 am | by Zeljka Zorz, Help Net Security | News | Comments

Admins of sites that run Drupal 7 are advised to update to the latest version of the platform — version 7.32 — because it fixes a critical SQL injection vulnerability that can ultimately lead to site hijacking and data theft.       

The Russian high-tech crime market for 2014 is showing ever-increasing sophistication, with criminals creating shadow worlds of illegal activity, exploiting new financial theft techniques and incorporating mobile attacks more often.

Russian Cyber Crime Refines Its Operations

October 16, 2014 11:15 am | by Tara Seals, Infosecurity Magazine | News | Comments

The Russian high-tech crime market for 2014 is showing ever-increasing sophistication, with criminals creating shadow worlds of illegal activity, exploiting new financial theft techniques and incorporating mobile attacks more often.     

The U.S. Justice Department has piled on more charges against alleged cybercrime kingpin Roman Seleznev, a Russian national who made headlines in July when it emerged that he’d been whisked away to Guam by U.S. federal agents while vacationing in the Mald

Seleznev Arrest Explains '2Pac' Downtime

October 16, 2014 11:03 am | by Editor | Blogs | Comments

The U.S. Justice Department has piled on more charges against alleged cybercrime kingpin Roman Seleznev, a Russian national who made headlines in July when it emerged that he’d been whisked away to Guam by U.S. federal agents while vacationing in the Maldives.

The cost and regularity of digital attacks against business continue to rise steadily, with no obvious end to the assault on the horizon.

Average Company Attacked Every Four Days

October 16, 2014 10:57 am | by Steve Ranger, ZDNet | News | Comments

The cost and regularity of digital attacks against business continue to rise steadily, with no obvious end to the assault on the horizon.                                

FBI Warns US Businesses of Cyber Attacks Blaming China

October 16, 2014 10:04 am | by Jim Finkle, Reuters | News | Comments

The U.S. Federal Bureau of Investigation said on Wednesday that hackers it believes to be backed by the Chinese government have recently launched attacks on U.S. companies.                      

Across the nation, private foundations are increasingly being tapped to provide police with technology and weaponry that — were it purchased with public money — would come under far closer scrutiny.

Private Donors Supply Spy Gear to Police

October 16, 2014 9:57 am | by Ali Winston and Darwin Bond Graham, ProPublica | News | Comments

Across the nation, private foundations are increasingly being tapped to provide police with technology and weaponry that — were it purchased with public money — would come under far closer scrutiny.         

It’s easy to see how forensics used during a cyberattack investigation are similar to those used in a physical crime scene.

Crime Scene Mistakes Can Sink a Digital Forensic Investigation

October 16, 2014 9:33 am | by Jayne Friedland Holland, GCN | News | Comments

It’s easy to see how forensics used during a cyberattack investigation are similar to those used in a physical crime scene.                                    

The sophisticated electronic components that are making modern cars safer, greener, and smarter are also making them dangerously vulnerable to cyber attacks.

Connected Cars Tough Fight with Cyber Crime

October 15, 2014 12:23 pm | by Jai Vijayan, Information Week | News | Comments

The sophisticated electronic components that are making modern cars safer, greener, and smarter are also making them dangerously vulnerable to cyber attacks.                           

Digital forensics firm Cellebright has moved from copying contacts on mobile phones to digital forensics, helping police collar the bad guys along the way.

Company Gets Smartphones to Rat Out Criminal Owners

October 15, 2014 12:09 pm | by Niv Lilien, ZDNet | Cellebrite USA, Inc. | News | Comments

Digital forensics firm Cellebright has moved from copying contacts on mobile phones to digital forensics, helping police collar the bad guys along the way.                           

In an interview with ISMG, Garet Moravec, an independent security consultant, offers a hypothetical example of thwarting Chinese hackers trying to breach a defense contractor's systems to pilfer designs on a jet fighter by using a honeypot, a trap contain

Hackers Manipulated as Advanced Threat Response

October 15, 2014 11:09 am | by Eric Chabrow, Gov Info Security | News | Comments

In an interview with ISMG, Garet Moravec, an independent security consultant, offers a hypothetical example of thwarting Chinese hackers trying to breach a defense contractor's systems to pilfer designs on a jet fighter by using a honeypot, a trap containing fake information that's designed to look like part of a network.

Social Media No Help in Bank's Cyber Crime Fight

October 15, 2014 10:47 am | by Steve Slater, Reuters | News | Comments

Banks are fighting an uphill battle to protect themselves and their client accounts from cyber attacks, and the sometimes careless use of social media by customers and staff isn't making the fight any easier.           

X
You may login with either your assigned username or your e-mail address.
The password field is case sensitive.
Loading