A question often asked is, “What education and training is necessary to work in digital forensics?” There is not one easy, simple answer to this question. First of all, an individual has to make a choice of career pathways, namely do they wish to work in the public sector or in the private sector.
Snowden, the former National Security Agency contractor who accessed and leaked reams of...
Reports in recent days of cyber incidents involving Russia and Ukraine are largely unconfirmed...
The tension between Russia and Crimea has a corresponding conflict in cyber space. Numerous attacks were registering on both sides during the revolution in Kiev, and the cyber offensives have had an escalation after the approval of the Russian parliament for military use in Crimea.
ThreatMetrix explains the risks consumers face during tax season and strategies to protect taxpayer identities, especially when filing online returns. Of all potentially fraudulent tax returns, 93 percent are filed online, asserting the heightened need for preventative cybersecurity measures to protect tax e-filing.
In October 2013, KrebsOnSecurity published an exclusive story detailing how a Vietnamese man running an online identity theft service bought personal and financial records on Americans directly from a company owned by Experian. Today’s story looks deeper.
Police investigating a burglary in Colorado are searching for a man who they believe snapped a selfie with an iPad reported stolen from a gymnastics studio.
Cyber Criminals are settling into a comfortable place in the "Dark Web" where they test, refine and distribute malware for online thievery.
Hackers took over the Reddit account and personal blog of Mark Karpeles, Mt. Gox’s CEO, to post an angry screed alleging that the exchange he ran had actually kept at least some of the bitcoins that the company had said were stolen from users.
CyanLine's computer forensic imaging system, FDAS, now enables “cloud-based forensics.” With the addition of network capability, FDAS can transmit directly to a secure SANS environment to allow investigators to collaborate on evidentiary images.
Since the first major protests in Kiev that triggered the current crisis with Moscow, American intelligence agencies have been on high alert for cyber attacks aimed at the new government in Ukraine. They were a bit late: the attacks started long before President Viktor F. Yanukovych was forced from office.
Everybody has a story. Everybody has a reason about why they ended up in the Digital Forensic and Incident Response (DFIR) field. Sharing these experiences is beneficial to those looking to follow in your footsteps; students fresh out of college, career changers, or people looking to do something different in DFIR.
A few days after selling WhatsApp to Facebook for $19 billion, Jan Koum stepped into a suite at the St. Regis Hotel in San Francisco to celebrate with old friends, including CEOs, reformed hackers and a few people who fell into both those camps.
Initially created to help political dissidents bypass traffic restrictions and hide their online activity from authoritarian governments, the Tor anonymity network has long since become a great tool for cyber crooks to hide their criminal activities and infrastructure.
Dorian Prentice Satoshi Nakamoto said Thursday that he is not the creator of bitcoin, adding further mystery to the story of how the world's most popular digital currency came to be.
Exposing a previously unknown weakness in the cryptographic system securing bitcoins, scientists have devised an attack that can steal large amounts of the digital currency when hackers run even unprivileged software on the same computer processing the coins.
The US government has moved to drop several charges against journalist and activist Barrett Brown that could have had far-reaching consequences for all users of the web.
As IT diversifies and grows increasingly complex, we can no longer afford to base our security on such outdated concepts. More and more, discovery and response are becoming focal points for strategic areas. We call this evolution cyber resilience.