Regardless of whether a Computer Forensics unit is a stand alone entity within a law enforcement agency, a section within a forensic laboratory, or is housed within a private corporation or business, Quality Assurance Practices are essential to its overall success.
A U.S. senator has asked 20 of the world's biggest automakers for information on how they secure...
The hacker who shook the US intelligence machinery and had world leaders railing against...
A new point-of-sale (POS) skimmer, used for lifting credit card details and PIN data at retail...
German police say they have arrested two people and seized illegally generated bitcoins worth more than 700,000 euros ($950,000) in an investigation of computer fraud. The Federal Criminal Police Office said it staged searches in an investigation of three people suspected of manipulating existing malware and spreading it over the Internet, creating a remotely controlled network of compromised computer systems.
This is pretty straight forward, but it depends on what we want to do with the files. I assumed that the larger files should be deleted since they are redundant. This will leave us with only the smallest file in the directory. Let's start off by listing all the files in the current directory and sort them by size.
The Canadian government recently put forward a new set of cyber laws designed to prevent online bullying. The proposed legislation immediately drew howls of outrage from all corners, accusing the government of simply reviving its previous failed attempt at introducing draconian state snooping in a new disguise. So, what's really going on with Bill C-13?
Computer scientists have developed a malware prototype that uses inaudible audio signals to communicate, a capability that allows the malware to covertly transmit keystrokes and other sensitive data even when infected machines have no network connection.
U.S. Immigration and Customs Enforcement's (ICE) Homeland Security Investigations (HSI) teamed with 10 foreign law enforcement agencies to seize hundreds of domain names that were illegally selling counterfeit merchandise online to unsuspecting consumers. The 706 domain names seized were set up to dupe consumers into unknowingly buying counterfeit goods as part of the holiday shopping season.
Passwords remain the primary means for online authentication and must be protected when stored on a server. Encryption is an option, but it has an inherent weakness in this application because the server authenticating the password must have the key to decrypt it. Hashing is a better option, especially with the judicious use of salt.
I bought Didier Steven's PDF workshop and just started them today. As he was showing PDFiD I was thinking about ways of using PDFiD to instantly focus my efforts for analysis when faced with multiple PDF documents. Of course my mind turned to Python, but I thought of an even easier shell script which could potentially do the job, depending on the number of files you have!
The Application Experience and Compatibility feature is considered one of the pillars in the in Microsoft Windows operating systems. Microsoft states in reference to the Microsoft Application Compatibility Infrastructure (Shim Infrastructure) "as the Windows operating system evolves from version to version changes to the implementation of some functions may affect applications that depend on them."
A Wisconsin man was sentenced on Monday to two years probation after he admitted taking part in a cyber attack sponsored by the hacker group Anonymous against Kansas conglomerate Koch Industries in February 2011, federal prosecutors said.
Belkasoft releases a major update to Belkasoft Evidence Center. Boosting version number to 6.0, the newest release of Belkasoft forensic suite facilitates a major price drop, introduces new editions, and offers a host of new features, functionality, and usability improvements.
The National Security Agency has been gathering records of online sexual activity and evidence of visits to pornographic websites as part of a proposed plan to harm the reputations of those whom the agency believes are radicalizing others through incendiary speeches, according to a top-secret NSA document.
Researchers have discovered a Linux worm capable of infecting a wide range of home routers, set-top boxes, security cameras, and other consumer devices that are increasingly equipped with an Internet connection.
From a cybercrime perspective, the opportunities are boundless: Seemingly everything has a computer in it, cars and pacemakers included. It’s almost certain that the sophistication of exploits and attacks will increase, and that new exploit modes will surface with the ongoing computing and mobility revolution.
The Hacker Academy recently released its new Windows Registry Master Class. Prior to its release, Hacker Academy senior instructor Andrew Case contacted me and asked if I'd like to review the course. I, of course, said yes and got signed up when the course was ready.
Since we learned that the NSA has surreptitiously weakened Internet security so it could more easily eavesdrop, we've been wondering if it's done anything to antivirus products. Given that it engages in offensive cyber attacks — and launches cyber weapons like Stuxnet and Flame — it's reasonable to assume that it's asked antivirus companies to ignore its malware.