The Islamic militant in a video showing the death of American journalist James Foley took great care to disguise his identity, dressing head-to-toe in black, with a mask leaving only his eyes visible. But police and intelligence services in Britain and the United States have a plethora of clues as they scramble to identify him, from image analysis and voice-recognition software to social media postings and testimony from former captives.
Researchers from Tel Aviv University have demonstrated an attack against the GnuPG encryption...
The majority of cyber attacks on northern European targets come from machines in Russia, while...
How are ex-military and ex-hackers different? For starters, security guys with a military...
When APTs (Advanced Persistent Threats) are discovered, network security operations professionals are instantly under pressure to explain and resolve the problems swiftly. Without a robust understanding of the context, network traffic and content, SecOps professionals are often left to rely on informed guesses and not verifiable facts.
We've heard this question a lot, haven't we? I attended a conference about 2 1/2 years ago, and the agenda for that conference had about half a dozen or more presentations that contained "APT" in their title. I attended several of them, and I have to say ... I walked out of some of them.
One important basic concept to grasp is working with character classes, or sets. A character class performs a search and matches only one character out of a choice of several.
A security researcher has announced that the notorious OpenSSL bug, Heartbleed, was the initial point of entry for the attack on Community Health Systems (CHS) that netted 4.5 million identity records — but other researchers point out that Heartbleed is only the beginning of the problem.
Computer security researchers from TU Darmstadt/CASED in Germany and North Carolina State University in USA have developed a modification to the core Android operating system that allows developers and users to plug in new security enhancements. The new Android Security Modules (ASM) framework aims to eliminate the bottleneck that prevents developers and users from taking advantage of new security tools.
Man-in-the-middle (MITM) attacks are “wreaking havoc” on Android users because over two-thirds of the most popular apps on Google Play contain SSL vulnerabilities, according to new research from FireEye.
The FBI has warned that healthcare industry companies are being targeted by hackers, publicizing the issue following an attack on U.S. hospital group Community Health Systems Inc that resulted in the theft of millions of patient records.
Dealing with insider threats, as in dealing with any threat to your network, requires a plan for incident response. An effective response includes forensics, and forensics and storage go hand in hand. With the window of time between a compromise and its discovery widening, the amount of storage needed to accommodate data is becoming greater.
I've been an adjunct professor at NYU Poly for almost two years now. It's been a great experience for a number of reasons, one of which is because I'm teaching a hot topic: Vulnerability Analysis and Exploitation.
The web intelligence firm Recorded Future has posted two stories about how al Qaeda is using new encryption software in response to the Snowden disclosures.
The GameOver Zeus botnet, disrupted only two months ago by an international joint operation, continues to echo throughout the cybercrime landscape.
The significant information breaches of today are executed by people infiltrating the organization, and attackers are doing this by assuming identities or abusing insider privileges.
With cyber war comes the threat of new forms of espionage, as well as sabotage conducted within both the information systems and control systems that form the interface between the physical and cyber worlds. Security, both physical and cyber, traditionally has been outward facing. But espionage and sabotage often are the domains of the trusted insider, the agent operating from within.
auto_rip is a wrapper script for Harlan Carvey's RegRipper and the script has a few updates. The script's home has always been on the RegRipper Google Code site but Google dropped support for adding new downloads. As a result, I thought it might be helpful to make newer versions available at different places since Google Code can no longer be used.
CCL will be demonstrating the social media monitoring tool Signal at the UK’s first international social media law enforcement conference.