In the first part of our Digital Evidence Series, we’ll be discussing Warrants as they apply to cell phones, computers, and other types of digital evidence. These types of evidence require a different set of procedures from those you are familiar with.
A new report by McAfee sheds light on the underground world of online gambling. It identifies...
The important role OpenSSL plays in securing the Internet has never been matched by the...
Apple iDevices have their serial number engraved on the back, right? So why the article? Because it's not true of newer devices like the iPhone 5, 5s, and 5c. Also, original cases can be replaced and serial numbers obliterated through unprotected use or deliberate act. Now I have your attention again, I hope.
Verizon released its Verizon Data Breach Investigations report (DBIR) recently, showing both an uptick in security incidents and a rising inability of enterprises to keep up with the rapidly evolving innovation on the part of cyber attackers.
Following a public comment period and review, NIST has removed a cryptographic algorithm from its draft guidance on random number generators. Before implementing the change, NIST is requesting final public comment.
Apple has patched versions of its iOS and OS X operating systems to fix yet another extremely critical cryptography vulnerability that leaves some users open to surreptitious eavesdropping.
For the Android platform, we find that roughly 150M downloads of Android apps contain OpenSSL libraries vulnerable to Heartbleed.
Criminals use a range of tactics from simple email scams to social-media threats to sophisticated malware, but only 11 percent of U.S. businesses have adopted industry-standard cybersecurity measures.
For all the talk about how something should be done to fix OpenSSL so that a Heartbleed situation is never again repeated, there has been little to no concrete action so far.
The MiniDAS is a portable, installable, live forensic analysis environment that provides the most comprehensive collection of forensic data possible.
Sometimes, when a computer forensics expert is dissecting a suspect’s computer, the most important question to answer is this: “Am I looking at the original hard-drive, with all of its incriminating evidence, or has that drive been swapped out surreptitiously for a new drive, which will not contain the evidence that I’m hoping to find?”
Canadian police confirmed an arrest has been made in the Netherlands in the case of a Canadian teenager who was blackmailed into exposing herself in front of a webcam. The 15-year-old later committed suicide after detailing her harassment on a YouTube video watched by millions around the world.
The drop in the crime rate over the past decade is misleading, according to a Hertfordshire, UK police chief. He argues that criminal behavior has moved online, where much of it goes either unreported or undetected.
Cyber crime and securities and commodities fraud will be targeted by new teams of Chicago prosecutors under a reshuffle ordered by U.S. Attorney Zach Fardon.
When you look at papers outlining how to build an enterprise-scale incident response process it shows the text book picture about what it should look like. It's not until you start building out the incident response (IR) process and/or responding to security events/incidents when you can truly see what the critical pieces are in the process.
For years, people have characterized the ineffectiveness of the online certificate status protocol (OCSP) as Exhibit A in the case that the Internet's secure sockets layer and transport layer security (TLS) protocols are hopelessly broken. Until now, no one paid much attention.
New Verizon 2014 Data Breach Investigations Report identifies nine types of attack patterns that accounted for 93 percent of security incidents in the past decade. Cyber criminals and cyber spies mostly log in to steal data.