Advertisement
The resource for digital forensic professionals
Subscribe to DFI News All

The Lead

Digital Clues Leading the Hunt for ISIS Killer

August 22, 2014 | by Jill Lawless, Associated Press | News | Comments

The Islamic militant in a video showing the death of American journalist James Foley took great care to disguise his identity, dressing head-to-toe in black, with a mask leaving only his eyes visible. But police and intelligence services in Britain and the United States have a plethora of clues as they scramble to identify him, from image analysis and voice-recognition software to social media postings and testimony from former captives.

TOPICS:
View Sample

SUBSCRIBE TO FREE
DFI News
EMAIL NEWSLETTER

When APTs (Advanced Persistent Threats) are discovered, network security operations professionals are instantly under pressure to explain and resolve the problems swiftly. Without a robust understanding of the context, network traffic and content, SecOps

Know Your Advanced Persistent Threats' Unknowns

August 22, 2014 10:26 am | by Information Buzz Security | News | Comments

When APTs (Advanced Persistent Threats) are discovered, network security operations professionals are instantly under pressure to explain and resolve the problems swiftly. Without a robust understanding of the context, network traffic and content, SecOps professionals are often left to rely on informed guesses and not verifiable facts.

TOPICS:

What does that 'look like'?

August 22, 2014 8:52 am | by Harlan Carvey | Blogs | Comments

We've heard this question a lot, haven't we? I attended a conference about 2 1/2 years ago, and the agenda for that conference had about half a dozen or more presentations that contained "APT" in their title. I attended several of them, and I have to say ... I walked out of some of them.

TOPICS:
One important basic concept to grasp is working with character classes, or sets. A character class performs a search and matches only one character out of a choice of several.

Data Search Character Classes

August 21, 2014 4:01 pm | Articles | Comments

One important basic concept to grasp is working with character classes, or sets. A character class performs a search and matches only one character out of a choice of several.                     

TOPICS:
Advertisement
A security researcher has announced that the notorious OpenSSL bug, Heartbleed, was the initial point of entry for the attack on Community Health Systems (CHS) that netted 4.5 million identity records — but other researchers point out that Heartbleed is o

Heartbleed Not Only Reason for Health Systems Breach

August 21, 2014 10:51 am | by Sara Peters, Dark Reading | News | Comments

A security researcher has announced that the notorious OpenSSL bug, Heartbleed, was the initial point of entry for the attack on Community Health Systems (CHS) that netted 4.5 million identity records — but other researchers point out that Heartbleed is only the beginning of the problem.

TOPICS:
Computer security researchers TU Darmstadt/CASED in Germany and North Carolina State University in USA have developed a modification to the core Android operating system that allows developers and users to plug in new security enhancements. The new Androi

Researchers Develop Framework to Facilitate New Android Security Modules

August 21, 2014 10:41 am | by CASED | News | Comments

Computer security researchers from TU Darmstadt/CASED in Germany and North Carolina State University in USA have developed a modification to the core Android operating system that allows developers and users to plug in new security enhancements. The new Android Security Modules (ASM) framework aims to eliminate the bottleneck that prevents developers and users from taking advantage of new security tools.

TOPICS:
Man-in-the-middle (MITM) attacks are “wreaking havoc” on Android users because over two-thirds of the most popular apps on Google Play contain SSL vulnerabilities, according to new research from FireEye.

SSL Vulnerabilities Found in Most Popular Android Apps

August 21, 2014 10:22 am | by Infosecurity Magazine | News | Comments

Man-in-the-middle (MITM) attacks are “wreaking havoc” on Android users because over two-thirds of the most popular apps on Google Play contain SSL vulnerabilities, according to new research from FireEye.             

TOPICS:

FBI Warns Healthcare Firms They are Targeted by Hackers

August 21, 2014 10:03 am | by Jim Finkle, Reuters | News | Comments

The FBI has warned that healthcare industry companies are being targeted by hackers, publicizing the issue following an attack on U.S. hospital group Community Health Systems Inc that resulted in the theft of millions of patient records.   

TOPICS:
Dealing with insider threats, as in dealing with any threat to your network, requires a plan for incident response. An effective response includes forensics, and forensics and storage go hand in hand. With the window of time between a compromise and its d

Incident Response Requires Forensics and Storage

August 21, 2014 9:49 am | by William Jackson, GCN | News | Comments

Dealing with insider threats, as in dealing with any threat to your network, requires a plan for incident response. An effective response includes forensics, and forensics and storage go hand in hand. With the window of time between a compromise and its discovery widening, the amount of storage needed to accommodate data is becoming greater.

TOPICS:
Advertisement
I've been an adjunct professor at NYU Poly for almost two years now. It's been a great experience for a number of reasons, one of which is because I'm teaching a hot topic: Vulnerability Analysis and Exploitation.

Learning Exploitation with FSExploitMe

August 21, 2014 9:28 am | by Brad Antoniewicz | Blogs | Comments

I've been an adjunct professor at NYU Poly for almost two years now. It's been a great experience for a number of reasons, one of which is because I'm teaching a hot topic: Vulnerability Analysis and Exploitation.           

TOPICS:
The web intelligence firm Recorded Future has posted two stories about how al Qaeda is using new encryption software in response to the Snowden disclosures.

The Security of al Qaeda Encryption Software

August 20, 2014 11:32 am | by Bruce Schneier | Blogs | Comments

The web intelligence firm Recorded Future has posted two stories about how al Qaeda is using new encryption software in response to the Snowden disclosures.                           

TOPICS:
The GameOver Zeus botnet, disrupted only two months ago by an international joint operation, continues to echo throughout the cybercrime landscape.

Bugat Malware Adds GameOver Functionality

August 20, 2014 11:08 am | by Tara Seals, Infosecurity Magazine | News | Comments

The GameOver Zeus botnet, disrupted only two months ago by an international joint operation, continues to echo throughout the cybercrime landscape.                             

TOPICS:
The significant information breaches of today are executed by people infiltrating the organization, and attackers are doing this by assuming identities or abusing insider privileges.

Today's Biggest Security Gap? Identity

August 20, 2014 10:47 am | by Travis Greene, Security Week | News | Comments

The significant information breaches of today are executed by people infiltrating the organization, and attackers are doing this by assuming identities or abusing insider privileges.                       

TOPICS:

Agencies Stalk the Insider Threat

August 20, 2014 10:25 am | by William Jackson, GCN | News | Comments

With cyber war comes the threat of new forms of espionage, as well as sabotage conducted within both the information systems and control systems that form the interface between the physical and cyber worlds. Security, both physical and cyber, traditionally has been outward facing. But espionage and sabotage often are the domains of the trusted insider, the agent operating from within.

TOPICS:
auto_rip is a wrapper script for Harlan Carvey's RegRipper and the script has a few updates. The script's home has always been on the RegRipper Google Code site but Google dropped support for adding new downloads. As a result, I thought it might be helpfu

auto_rip, tr3secure_collection & DFS Updates

August 20, 2014 10:09 am | by Corey Harrell | Blogs | Comments

auto_rip is a wrapper script for Harlan Carvey's RegRipper and the script has a few updates. The script's home has always been on the RegRipper Google Code site but Google dropped support for adding new downloads. As a result, I thought it might be helpful to make newer versions available at different places since Google Code can no longer be used.

TOPICS:
CCL will be demonstrating the social media monitoring tool Signal at the UK’s first international social media law enforcement conference.

CCL to Showcase Social Media Tools for Law Enforcement at Smile Conference

August 20, 2014 8:08 am | CCL-Forensics Limited | News | Comments

CCL will be demonstrating the social media monitoring tool Signal at the UK’s first international social media law enforcement conference.                               

TOPICS:

Pages

X
You may login with either your assigned username or your e-mail address.
The password field is case sensitive.
Loading