Advertisement
The resource for digital forensic professionals
Subscribe to DFI News All

The Lead

Solid State Drives: Part 6

April 16, 2014 8:17 am | by John J. Barbara | Articles | Comments

When compared to a typical hard drive, SSDs are totally different in design and functionality which leads to some difficult issues to deal with pertaining to their forensic analysis. The SSD’s use of flash memory for data storage rather than rotating magnetic discs is the cause of the forensic issues.

TOPICS:
View Sample

SUBSCRIBE TO FREE
DFI News
EMAIL NEWSLETTER

Fake Peoria Mayor Twitter Account Prompts Raid

April 18, 2014 10:28 am | by Associated Press | News | Comments

Police officers trying to find out who was behind a fake Twitter account set up in the name of Peoria's mayor have raided a home, seizing computers and phones and hauling several people in to be questioned.             

TOPICS:

The Hidden Costs of Heartbleed

April 18, 2014 10:10 am | by Matthew Prince | Blogs | Comments

One question we've received is why we didn't just reissue and revoke all SSL certificates as soon as we got word about the Heartbleed vulnerability? The answer is that the revocation process for SSL certificates is far from perfect and imposes a significant cost on the Internet's infrastructure.

TOPICS:

3 Million Customer Credit, Debit Cards Stolen in Michaels, Aaron Brothers Breaches

April 18, 2014 9:59 am | by Editor | Blogs | Comments

Nationwide arts and crafts chain Michaels Stores Inc. said today that two separate eight-month-long security breaches at its stores last year may have exposed as many as 3 million customer credit and debit cards.          

TOPICS:
Advertisement

Merging VMDKs & Delta/Snapshot Files

April 17, 2014 10:27 am | by Dan Pullega | Blogs | Comments

I had a VM that was suspended. I needed to see the most recent version of the filesystem. Upon mounting the base .vmdk file, I was presented with the filesystem that existed before the snapshot was taken.             

TOPICS:

Dark Web Search Makes Buying Guns and Drugs Easy

April 17, 2014 10:08 am | by Kim Zetter, Wired | News | Comments

The dark web just got a little less dark with the launch of a new search engine that lets you easily find illicit drugs and other contraband online.                             

TOPICS:

Student Hacker Arrested for Heartbleed Breach

April 17, 2014 9:52 am | by Zeljka Zorz, Help Net Security | News | Comments

A 19-year-old Canadian student has been arrested for breaching the systems of the Canada Revenue Agency (CRA) and extracting Social Insurance Numbers of some 900 taxpayers. It is believed that he was able to do so by exploiting the infamous Heartbleed bug.

TOPICS:

Did a Faulty Memory Feature Lead to Heartbleed?

April 17, 2014 9:40 am | by Kelly Jackson Higgins, Dark Reading | News | Comments

As the dust begins to settle on the Heartbleed bug, developers in the open source community are digging deeper into what really went wrong in OpenSSL to cause the encryption software to be exposed to leaking information and digital keys.   

TOPICS:

Portrait of the Cyber Criminal as a Young Man

April 16, 2014 3:44 pm | by UC Irvine | News | Comments

Shady stock trades are nothing new to Henry Pontell, UC Irvine professor of criminology, law & society and sociology. What’s changed isn’t the scam but the artist: In this digital age, the criminal mastermind is often a mere child.    

TOPICS:
Advertisement

Pedophiles Lured by Avatar in Tech Industry Porn Fight

April 16, 2014 11:02 am | by Kristen Schweizer, Bloomberg | News | Comments

Sweetie looks much like other unfortunate young Filipinas. But unlike her peers, Sweetie is a computer-generated avatar created by a Dutch non-profit group seeking to unmask sexual predators on the Internet.            

TOPICS:

Inside Europe's Digital Crime Unit

April 16, 2014 10:37 am | by Tom Brewster, the Guardian | News | Comments

Four black brick towers search upwards to an empty grey sky. Mounted security cameras watch on balefully. If it weren’t for all the cheery cyclists passing by, some with surfboards in hand, alleviating the unfaltering graveness of the place, Europol’s headquarters would strike any visitor as some post-apocalyptic Mordor.

TOPICS:

(ISC)² Offers Cyber Forensics Certification in Europe

April 16, 2014 10:24 am | by (ISC)2 | News | Comments

The Certified Cyber Forensics Professional is the only global standard currently available for assessing experienced digital forensics professionals’ mastery of the discipline. Originally only available for the U.S. and South Korea, the credential has been developed for the European legal environment.

TOPICS:

The Forensic Snake: Using Python to Squeeze the Mobile Device

April 16, 2014 8:46 am | by Lee Reiber | Blogs | Comments

When I started my pilgrimage into mobile forensics, I did so with the goal of providing the law enforcement community with the tools and training that would assist investigators in extracting relevant data from cell phones.       

TOPICS:

Crimeware or APT? Malware’s 'Fifty Shades of Grey'

April 16, 2014 8:40 am | by Nart Villeneuve and Mike Scott | Blogs | Comments

Some cyber criminals build massive botnets to use unsuspecting endpoints for spam, distributed denial-of-service (DDoS) attacks, or large-scale click fraud. With the aid of banking Trojans, other cyber criminals create smaller, specialized botnets that focus on stealing bank credentials and credit card information.

TOPICS:

Pulitzer for NSA Coverage Echoes Tradition in News

April 15, 2014 11:00 am | by Brett Zonger, Associated Press | News | Comments

Coverage of the National Security Agency's sweeping surveillance program that won the Pulitzer Prize for public service Monday follows a tradition of bucking the U.S. government on matters of secret intelligence.           

TOPICS:

Heartbleed Bug Affects Android Phones, Other Devices

April 15, 2014 10:20 am | by Dan Goodin, Ars Technica | News | Comments

The catastrophic Heartbleed security bug that has already bitten Yahoo Mail, the Canada Revenue Agency, and other public websites also poses a formidable threat to end-user applications and devices, including millions of Android handsets, security researchers warn.

TOPICS:

Pages

X
You may login with either your assigned username or your e-mail address.
The password field is case sensitive.
Loading