The resource for digital forensic professionals
Subscribe to DFI News All

The Lead

Talk Forensics - Warrants

April 21, 2014 8:19 am | Videos | Comments

In the first part of our Digital Evidence Series, we’ll be discussing Warrants as they apply to cell phones, computers, and other types of digital evidence. These types of evidence require a different set of procedures from those you are familiar with.

View Sample

DFI News

Finding Serial Numbers on Locked iPhones

April 24, 2014 10:53 am | by John Lehr | Blogs | Comments

Apple iDevices have their serial number engraved on the back, right? So why the article? Because it's not true of newer devices like the iPhone 5, 5s, and 5c. Also, original cases can be replaced and serial numbers obliterated through unprotected use or deliberate act. Now I have your attention again, I hope.  


Verizon DBIR Wake-up Call

April 24, 2014 9:58 am | by Infosecurity | News | Comments

Verizon released its Verizon Data Breach Investigations report (DBIR) recently, showing both an uptick in security incidents and a rising inability of enterprises to keep up with the rapidly evolving innovation on the part of cyber attackers.  


NIST Removes Cryptography Algorithm from Random Number Generator Recommendations

April 24, 2014 9:22 am | by NIST | News | Comments

Following a public comment period and review, NIST has removed a cryptographic algorithm from its draft guidance on random number generators. Before implementing the change, NIST is requesting final public comment.         


iPhones and Macs Get Cryto Bug Fix

April 23, 2014 10:32 am | by Dan Goodin, Ars Technica | News | Comments

Apple has patched versions of its iOS and OS X operating systems to fix yet another extremely critical cryptography vulnerability that leaves some users open to surreptitious eavesdropping.                 


If an Android Has a Heart, Does It Bleed?

April 23, 2014 10:16 am | by Yulong Zhang, Hui Xue and Tao Wei | Blogs | Comments

For the Android platform, we find that roughly 150M downloads of Android apps contain OpenSSL libraries vulnerable to Heartbleed.                                   

Ramping Up Cybersecurity

April 23, 2014 9:52 am | by Joe McGonegal, MIT Technology Review | News | Comments

Criminals use a range of tactics from simple email scams to social-media threats to sophisticated malware, but only 11 percent of U.S. businesses have adopted industry-standard cybersecurity measures.              


OpenBSD Forks OpenSSL to Create Safer SSL/TLS Library

April 23, 2014 9:36 am | by Zeljka Zorz, Help Net Security | News | Comments

For all the talk about how something should be done to fix OpenSSL so that a Heartbleed situation is never again repeated, there has been little to no concrete action so far.                     


Forensic Thumbdrive Imager

April 23, 2014 9:10 am | CyanLine | Product Releases | Comments

The MiniDAS is a portable, installable, live forensic analysis environment that provides the most comprehensive collection of forensic data possible.


Two Vital Pieces of Computer Evidence Have a Hidden Source

April 23, 2014 8:59 am | by Jacob Goodwin, Government Security News | CyanLine | News | Comments

Sometimes, when a computer forensics expert is dissecting a suspect’s computer, the most important question to answer is this: “Am I looking at the original hard-drive, with all of its incriminating evidence, or has that drive been swapped out surreptitiously for a new drive, which will not contain the evidence that I’m hoping to find?”


Dutch Man's Case Linked to Amanda Todd

April 22, 2014 11:09 am | by Jeremy Hainsworth and Toby Sterling, Associated Press | News | Comments

Canadian police confirmed an arrest has been made in the Netherlands in the case of a Canadian teenager who was blackmailed into exposing herself in front of a webcam. The 15-year-old later committed suicide after detailing her harassment on a YouTube video watched by millions around the world.


Crime is Not Falling, It's Moved Online

April 22, 2014 10:58 am | by Tom Dry, The Telegraph | News | Comments

The drop in the crime rate over the past decade is misleading, according to a Hertfordshire, UK police chief. He argues that criminal behavior has moved online, where much of it goes either unreported or undetected.         


Chicago Teams Created to Target Cyber Crime, Securities Fraud

April 22, 2014 10:50 am | by Kim Janssen, Chicago Sun-Times | News | Comments

Cyber crime and securities and commodities fraud will be targeted by new teams of Chicago prosecutors under a reshuffle ordered by U.S. Attorney Zach Fardon.                          


Triaging with the RecentFileCache.bcf File

April 22, 2014 10:38 am | by Corey Harrell | Blogs | Comments

When you look at papers outlining how to build an enterprise-scale incident response process it shows the text book picture about what it should look like. It's not until you start building out the incident response (IR) process and/or responding to security events/incidents when you can truly see what the critical pieces are in the process.


Heartbleed Transforms HTTPS

April 22, 2014 10:16 am | by Dan Goodin, Ars Technica | News | Comments

For years, people have characterized the ineffectiveness of the online certificate status protocol (OCSP) as Exhibit A in the case that the Internet's secure sockets layer and transport layer security (TLS) protocols are hopelessly broken. Until now, no one paid much attention.


Stolen Passwords Used in Most Data Breaches

April 22, 2014 10:06 am | by Kelly Jackson Higgins, Dark Reading | News | Comments

New Verizon 2014 Data Breach Investigations Report identifies nine types of attack patterns that accounted for 93 percent of security incidents in the past decade. Cyber criminals and cyber spies mostly log in to steal data.       



You may login with either your assigned username or your e-mail address.
The password field is case sensitive.