What most agencies fail to realize is that the lack of SOPs involving digital image integrity and workflow means images submitted for court purposes may not survive if challenged by a knowledgeable attorney. These digital complexities have not yet been realized, so images taken by photographers will likely fail one of three very basic criteria.
Another week, another huge Bitcoin theft. This time, it’s the customers of Tor-based underground...
Earlier this year, researchers say, someone mysteriously hijacked internet traffic headed to...
Security Innovation, a company that specializes in application and crypto security, has announced availability of its NTRU public key cryptography system for free use in the open-source software community.
As security researchers look into a Linux worm that's gaining steam by targeting embedded devices, the lessons they learn could prove instructive for the industry as it seeks to protect the Internet of Things.
Since PDF files are so common these days there's no shortage of tools to rip them apart and analyze them. Some of the information contained in this post and within the code I'm releasing may be an overlap of others out there but that's mainly because the results of our research produced similar results or our minds think alike.
There have been some exciting developments recently on the Windows digital forensic analysis front, and I thought it would be a good idea to bring them all together in one place.
Digital forensic investigators can be dangerous; one poor assumption could lead to several false accusations. Because of this, proper interpretation of forensic artifacts is paramount in any investigation.
JPMorgan Chase & Co is warning some 465,000 holders of prepaid cash cards issued by the bank that their personal information may have been accessed by hackers who attacked its network in July.
The Washington Post has added another noteworthy finding to the growing pile of information leaked by former NSA contractor Edward Snowden: the NSA is collecting nearly five billion cellphone location records per day from across the world. The Post reports that this initiative allows the NSA to track individuals and map relationships "in ways that would have been previously unimaginable."
With the average cost of a cyber attack in the UK exceeding $1.5 million, employees should be more vigilant than ever about clicking on a link or attachment in unsolicited emails. But social engineering still works, and it turns out that breaking news fronts the email attacks that employees are most vulnerable to.
Corey Harell has uploaded an excellent writeup on the working of Windows Application Experience and Compatibility features. Here he explains how process entries/traces show up in locations such as the ShimCache and RecentFileCache.bcf. For forensic/malware analysts, this is a great place to search for recent processes that were run.
German police say they have arrested two people and seized illegally generated bitcoins worth more than 700,000 euros ($950,000) in an investigation of computer fraud. The Federal Criminal Police Office said it staged searches in an investigation of three people suspected of manipulating existing malware and spreading it over the Internet, creating a remotely controlled network of compromised computer systems.
A U.S. senator has asked 20 of the world's biggest automakers for information on how they secure their vehicles from cyber attacks, in light of reports by security experts who say they have identified ways to hack into cars.
The hacker who shook the US intelligence machinery and had world leaders railing against Washington for spying on them picked up crucial skills in India. Edward Snowden, the National Security Agency contractor-turned-whistleblower, spent a week in New Delhi training in core Java programming and advanced ethical hacking. It's this training that got him certified as an EC-Council Certified Security Analyst (ECSA).
A new point-of-sale (POS) skimmer, used for lifting credit card details and PIN data at retail locations, has gone on sale for thousands of dollars on semi-private underground crime forums. The skimmer is notable in that it can be installed and removed in the blink of an eye.
This is pretty straight forward, but it depends on what we want to do with the files. I assumed that the larger files should be deleted since they are redundant. This will leave us with only the smallest file in the directory. Let's start off by listing all the files in the current directory and sort them by size.
The Canadian government recently put forward a new set of cyber laws designed to prevent online bullying. The proposed legislation immediately drew howls of outrage from all corners, accusing the government of simply reviving its previous failed attempt at introducing draconian state snooping in a new disguise. So, what's really going on with Bill C-13?