The resource for digital forensic professionals
Subscribe to DFI News All

The Lead

With the global smartphone market expected to total 1.75 billion users this year, it is rare for an investigator to conduct a digital forensic investigation that does not include a smartphone.

Digging for Data, Finding Evidence in Third-Party Applications

July 16, 2014 | by Heather Mahalik and Cesar Quezada | Basis Technology, SANS Institute | Articles | Comments

With the global smartphone market expected to total 1.75 billion users this year, it is rare for an investigator to conduct a digital forensic investigation that does not include a smartphone. While smartphone forensics has vastly improved over the years, third-party apps are making it increasingly difficult for investigators to find data. As a result, valuable evidence is being overlooked.

View Sample

DFI News

Gmail Account is Fair Game, Says US Judge

July 22, 2014 9:49 am | by Lisa Vaas | Blogs | Comments

A New York court opened up our entire Gmail accounts to feds or cops with warrants, in spite of two recent decisions that went against similar requests.                           


Forensic Scientist Identifies 'Back Doors' Running on iOS

July 21, 2014 2:25 pm | by Jason O'Grady | Blogs | Comments

Forensic scientist and author Jonathan Zdziarski has posted the slides from his talk at the Hackers On Planet Earth (HOPE/X) conference in New York called Identifying Backdoors, Attack Points, and Surveillance Mechanisms in iOS Devices.  


Russia Caught Editing Wikipedia Entry about MH17

July 21, 2014 10:31 am | by Kadhim Shubber, Wired UK | News | Comments

Thanks to a Twitter bot that monitors Wikipedia edits made from Russian government IP addresses, someone from the All-Russia State Television and Radio Broadcasting Company (VGTRK) has been caught editing a Russian-language Wikipedia reference to MH17 in an article on aviation disasters.


The Dangers of Social Media in the Military

July 21, 2014 9:59 am | by Lance Cpl. Tyler Giguere, DVIDS | News | Comments

Common tactics of social media extortionists include relating to a service member’s interests and posting pictures of attractive females to lure them into chats. What may seem like a normal person wanting to video chat or meet with a Marine, can actually be an extortionist trying to deceive him for his money or information.


Criminal Software, Government-grade Protection

July 21, 2014 9:43 am | by Quentin Hardy | Blogs | Comments

Researchers at a software security company say they have found a popular type of criminal software inside an extremely sophisticated “evasion code,” which they say was previously used by Russia to spy on one or more Eastern European governments.


Computer Forensics Reveal Murderous Searches

July 21, 2014 9:04 am | by Andy Kravetz, Journal Star | News | Comments

Although they don’t have an eyewitness or the actual murder weapon, Peoria County, Illinois prosecutors believe they have the next best thing — a series of Internet searches on Nathan Leuthold’s computer about ways to kill someone.     


NIST's Future without the NSA

July 21, 2014 8:40 am | by Brian Robinson | Blogs | Comments

Will the National Institute of Standards and Technology break its close relationship with the National Security Agency in developing cryptographic and cybersecurity standards? That seems very likely following a recent report by an outside panel of experts, and it will have implications for federal agencies.


Computer Forensics with P2 Commander

July 18, 2014 9:42 am | by Pranshu Bajpai, Infosec Institute | News | Comments

Computer Forensics is the methodical series of procedures and techniques used for procuring evidence from computer systems and storage media. This evidence can then be analyzed for relevant information that is to be presented in a court of law. Computer Forensics has frequently been listed as one of the most intriguing computer professions, however beginners may find themselves overwhelmed quickly.


The Switch to Private Sector Digital Forensics

July 18, 2014 9:05 am | Articles | Comments

There is clearly a difference in the type of investigations and examinations being performed versus what are encountered in the public sector. The private sector examiner can be expected to provide evidence to private attorneys, corporations, private investigators, and corporate security departments.


New York Proposes Restrictive Bitcoin Regulations

July 18, 2014 8:05 am | by Michael Virtanen, Associated Press | News | Comments

New York regulators have proposed establishing rules for firms involved in receiving, transmitting and storing virtual currency, as well as retail conversions. The proposal by the Department of Financial Services would establish a so-called BitLicense.


How Elite Hackers (Almost) Stole the NASDAQ

July 18, 2014 8:04 am | by Dan Goodin, Ars Technica | News | Comments

In 2010, elite hackers, most likely from Russia, used at least two zero-day vulnerabilities to penetrate the computer network operated by Nasdaq Stock Market, a hack that allowed them to roam unmolested for months and plant destructive malware designed to cause disruptions, according to a media report.


Android Has Some Words with Monkey

July 18, 2014 8:03 am | by Editor | Blogs | Comments

The recent NIST Mobile Forensics Webcast and SANS FOR585 poster got monkey thinking about using the Android emulator for application artefact research. By using an emulator, we don't need to "root" an Android device in order to access artifacts from the protected data storage area.  


Live Response vs. Traditional Forensics

July 18, 2014 8:03 am | by Editor | Blogs | Comments

The term live response is being heard more and more frequently but what exactly is it and how does it differ from traditional forensics.                                 


Senate Hearing Looks to Cybercrime Law to Fight Botnets

July 17, 2014 10:19 am | by Sara Peters, Dark Reading | News | Comments

In the wake of Microsoft's seizure of No-IP servers and domains, private and public sector representatives met to discuss what can be done to address the problem of botnets.                     


World Cup Hackers Down Tools During FIFA Final

July 17, 2014 9:32 am | by Infosecurity | News | Comments

Cyber criminals may have upped their game during the FIFA World Cup 2014 tournament but malicious activity almost completely stopped during the final between Argentina and Germany on Sunday, according to researchers.         



You may login with either your assigned username or your e-mail address.
The password field is case sensitive.