Advertisement
The resource for digital forensic professionals
Subscribe to DFI News All

The Lead

How to Collect Internet Evidence

October 22, 2014 | Articles | Comments

The courts have generally accepted evidence collected from the Internet as long as its authenticity can be established. Commonly accepted digital forensic methodologies can all be used to identify a three-pronged approach to Internet forensics.

TOPICS:
View Sample

SUBSCRIBE TO FREE
DFI News
EMAIL NEWSLETTER

Contact Opposing Counsel After Inadvertent Disclosure

October 24, 2014 9:53 am | by Joshua Gilliland, Esq. | Blogs | Comments

What happens when a lawyer inadvertently produces an attorney protected by the attorney-client privilege? A Magistrate Judges and District Court Judge orders the receiving party to destroy the inadvertently produced email.  

TOPICS:
FBI Director James Comey has compared Chinese hackers to a "drunk burglar" — not so subtle, but prolific and reckless enough to cost US companies billions each year.

White Hat Hackers Employed to Find Vulnerabilities

October 24, 2014 9:42 am | News | Comments

Cyber-crime is big business in the digital age, so a Bay Area security firm has hired a sophisticated group of hackers to break into computer systems. “White-hat hackers” deliberately break into computer systems and digital devices to find vulnerabilities before “black-hat hackers” can exploit them.  

TOPICS:

Cloud Computing Presents a Unique Forensic Challenge

October 23, 2014 8:00 pm | Articles | Comments

Cloud computing raises some unique law enforcement concerns regarding the location of potential digital evidence, its preservation, and its subsequent forensic analysis. Further forensic issues concern the potential effect the cloud services could have on the digital data itself and how the forensic examiner can explain all these indiscretions to the court.

TOPICS:
Advertisement
One should not expect to find all user information sitting in the default folder or default location for a given type of file (e.g. Application Data or similar folder). Searching the entire hard disk is required in order to locate all unencrypted log and

FAA Seeks App to Preserve Digital Evidence

October 23, 2014 12:01 pm | News | Comments

To help with the collection, management, protection and preservation of digital forensic evidence, the Federal Aviation Administration is turning to industry. In an Oct. 15 posting, the FAA said it's seeking a commercial off-the-shelf application that will create a remotely accessible depository where digital media analysts can store digital forensic evidence and distribute forensic workload among investigators.

TOPICS:
Your medical information is worth 10 times more than your credit card number on the black market. Security experts say cyber criminals are increasingly targeting the $3 trillion U.S. healthcare industry, which has many companies still reliant on aging com

US Investigating Cybersecurity Flaws in Medical Devices

October 23, 2014 11:52 am | News | Comments

The U.S. Department of Homeland Security is investigating about two dozen cases of suspected cybersecurity flaws in medical devices and hospital equipment that officials fear could be exploited by hackers, a senior official at the agency told Reuters.

TOPICS:

Four Ways Snowden Got it Wrong

October 23, 2014 11:29 am | by Dave Aitel | Blogs | Comments

As a former ‘research scientist’ at the National Security Agency, I feel compelled to respond to James Bamford’s exclusive interview with Edward Snowden that appeared in the September issue of Wired magazine. Many of the factual assertions about the NSA and intelligence community that were included in Bamford’s article, and previous Snowden “disclosures,” are highly questionable.

TOPICS:

Timeline Analysis by Categories

October 22, 2014 11:24 am | by Corey Harrell | Blogs | Comments

"Corey, at times our auditors find fraud and when they do sometimes they need help collecting and analyzing the data on the computers and network. Could you look into this digital forensic thing just in case if something comes up?" This simple request is what lead me into the digital forensic and incident response field. In this post I'm highlighting how this type of organization is applied to timeline analysis leveraging Plaso.

TOPICS:
In this blog post we'll be looking at a new type of malware for Android phones that encrypts important files and demands the user pay a ransom to regain access to their phone.

Android Images Can Conceal Code

October 22, 2014 11:12 am | News | Comments

Someone's found (yet) another nasty security flaw in Android, by crafting a way to pack malicious software to look like images. The good news is that disclosure was kept back until Google had put a fix in place; the bad news is, of course, the huge number of phone-owners who never update – either through choice, ignorance or that their handset-maker holds back upgrades.

TOPICS:
Advertisement

Justice Department Expands Fight Against Cybercrime

October 22, 2014 11:08 am | News | Comments

The Justice Department is expanding its National Security division to take on threats to the country from state-sponsored economic espionage and cybercrime, assistant attorney general for national security John Carlin said Tuesday.

TOPICS:

Canada to Deport Alleged Anonymous Hacker

October 22, 2014 10:40 am | News | Comments

Matt DeHart, an American who believes the United States is pursuing sham child-porn charges against him as cover for a national security investigation, has been ordered deported from Canada. The 30-year-old faces up to 25 years in prison if convicted of child pornography charges in Tennessee.

TOPICS:

Can You Ask the Court to Order a Party to Follow the Duty to Preserve?

October 21, 2014 8:52 am | by Joshua Gilliland, Esq. | Blogs | Comments

There are no shortage of cases where the duty to preserve has gotten attorneys and parties a like in trouble. However, it is difficult to ask a Court to order a party to “follow the rules,” because the party already has a duty to so. However, if there is evidence of wrongdoing by the party that was subject to the duty to preserve, the outcome could be different.

TOPICS:

Cost of Cybercrime on the Rise

October 21, 2014 6:57 am | News | Comments

According to the 2014 Cost of Cyber Crime Study, the average annualized cost of cybercrime has reached $12.7 million in the U.S., a 96 percent increase since the study was launched five years ago.                    

TOPICS:
While Android phones are constantly targeted by cyber criminals, the iPhone is considered more secure. Now, leaked documents from one of the world's leading surveillance companies have reaffirmed the idea.

Chinese Government Hacking iPhones?!?

October 21, 2014 6:54 am | News | Comments

Chinese authorities just launched “a malicious attack on Apple” that could capture user names and passwords of anyone who logs into the iCloud from anywhere in the country, the well-respected censorship watchdog GreatFire.org reports. With that information, a hacker can view users contacts, photos, messages and personal information stored in the cloud.  

TOPICS:
A two-stage financial attack has been discovered that targets multiple ATMs around the world, including Latin America, Europe and Asia, allowing attackers to remove money via direct manipulation and steal millions of dollars.

500 Million Financial Records Hacked over 12 Months

October 21, 2014 6:39 am | News | Comments

Federal officials warned companies Monday that hackers have stolen more than 500 million financial records over the past 12 months, essentially breaking into banks without ever entering a building.                                                                    

TOPICS:

NetClean Helps UK Home Office Fight Child Abuse

October 21, 2014 6:21 am | News | Comments

NetClean has announced that it has successfully collaborated with its partners, Hubstream and L-3 ASA, to implement the first phase of the UK’s national Child Abuse Image Database (CAID). The CAID plays a key part in delivering on the UK government’s promise to create a central repository for consolidating data in cases of child sexual abuse material.

TOPICS:

Pages

X
You may login with either your assigned username or your e-mail address.
The password field is case sensitive.
Loading