Advertisement
Blogs
Subscribe to DFI News

The Lead

Ever posted a picture of your cat online? Unless your privacy settings avoid making APIs publicly available on sites like Flickr, Twitpic, Instagram or the like, there's a cat stalker who knows where your liddl' puddin' lives, and he's totally pwned your

Cat Stalker Knows Where Your Kitty Lives (and It's Your Fault)

July 25, 2014 | by Lisa Vaas | Comments

Ever posted a picture of your cat online? Unless your privacy settings avoid making APIs publicly available on sites like Flickr, Twitpic, Instagram or the like, there's a cat stalker who knows where your liddl' puddin' lives, and he's totally pwned your pussy by geolocating it.

TOPICS:
View Sample

SUBSCRIBE TO FREE
DFI News
EMAIL NEWSLETTER

Recently, a hacker who's been campaigning to make a point about Apple security by playing fast and loose with the now widely-accepted definition of "backdoor" struck gold when journalists didn't do their homework and erroneously reported a diagnostic mech

The Apple Backdoor that Wasn't

July 28, 2014 9:04 am | by Violet Blue | Comments

Recently, a hacker who's been campaigning to make a point about Apple security by playing fast and loose with the now widely-accepted definition of "backdoor" struck gold when journalists didn't do their homework and erroneously reported a diagnostic mechanism as a nefarious, malfeasant, secret opening to their private data.

TOPICS:
As I mentioned in my previous post on this topic, there were two other tests that I wanted to conduct with respect to file system operations and the effects an analyst might expect to observe within the MFT, and the USN change journal.

File System Ops, Testing Phase 2

July 25, 2014 9:43 am | by Corey Harrell | Comments

As I mentioned in my previous post on this topic, there were two other tests that I wanted to conduct with respect to file system operations and the effects an analyst might expect to observe within the MFT, and the USN change journal.    

TOPICS:

European Central Bank Suffers Security Breach, Personal Data Stolen

July 24, 2014 9:57 am | by Charlie Osborne | Comments

The European Central Bank (ECB) admitted Thursday that a security breach has led to the theft of personal data.                                       

TOPICS:
Advertisement
I recently conducted some testing of different actions on a Windows 7 system, with the specific purpose of identifying artifacts within the file system (in this case, the MFT and the USN change journal), particularly within individual records.

File System Ops, Effects on MFT Records

July 24, 2014 8:17 am | by Corey Harrell | Comments

I recently conducted some testing of different actions on a Windows 7 system, with the specific purpose of identifying artifacts within the file system (in this case, the MFT and the USN change journal), particularly within individual records. 

TOPICS:
The Wall Street Journal was forced to take systems offline following a security breach, as yet another online publication suffers cyber attack.

Hacker Worms His Way into WSJ Computer Systems

July 23, 2014 10:07 am | by Charlie Osborne | Comments

The Wall Street Journal was forced to take systems offline following a security breach, as yet another online publication suffers cyber attack.                             

TOPICS:
I put together a python script that parses out several plist files related to Safari Internet History. Since the iPhone also uses Safari, I decided to expand the script to parse some iPhone Safari artifacts.

Safari and iPhone Internet History Parser

July 23, 2014 9:32 am | by Mari DeGrazia | Comments

I put together a python script that parses out several plist files related to Safari Internet History. Since the iPhone also uses Safari, I decided to expand the script to parse some iPhone Safari artifacts.            

TOPICS:

Gmail Account is Fair Game, Says US Judge

July 22, 2014 9:49 am | by Lisa Vaas | Comments

A New York court opened up our entire Gmail accounts to feds or cops with warrants, in spite of two recent decisions that went against similar requests.                           

TOPICS:

Forensic Scientist Identifies 'Back Doors' Running on iOS

July 21, 2014 2:25 pm | by Jason O'Grady | Comments

Forensic scientist and author Jonathan Zdziarski has posted the slides from his talk at the Hackers On Planet Earth (HOPE/X) conference in New York called Identifying Backdoors, Attack Points, and Surveillance Mechanisms in iOS Devices.  

TOPICS:
Advertisement

Criminal Software, Government-grade Protection

July 21, 2014 9:43 am | by Quentin Hardy | Comments

Researchers at a software security company say they have found a popular type of criminal software inside an extremely sophisticated “evasion code,” which they say was previously used by Russia to spy on one or more Eastern European governments.

TOPICS:

NIST's Future without the NSA

July 21, 2014 8:40 am | by Brian Robinson | Comments

Will the National Institute of Standards and Technology break its close relationship with the National Security Agency in developing cryptographic and cybersecurity standards? That seems very likely following a recent report by an outside panel of experts, and it will have implications for federal agencies.

TOPICS:

Android Has Some Words with Monkey

July 18, 2014 8:03 am | by Editor | Comments

The recent NIST Mobile Forensics Webcast and SANS FOR585 poster got monkey thinking about using the Android emulator for application artefact research. By using an emulator, we don't need to "root" an Android device in order to access artifacts from the protected data storage area.  

TOPICS:

Live Response vs. Traditional Forensics

July 18, 2014 8:03 am | by Editor | Comments

The term live response is being heard more and more frequently but what exactly is it and how does it differ from traditional forensics.                                 

TOPICS:

Google Recruits Top PS3 Hacker for Project Zero

July 17, 2014 9:16 am | by Charlie Osborne | Comments

Google has hired a prolific hacker by the name of George Hotz to join the Project Zero team. Hotz is well-known for hacking Sony's PlayStation 3 and Apple's iPhone.                         

TOPICS:

US GAO Report Highlights Incident Response Shortcomings

July 16, 2014 3:23 pm | by Richard Bejtlich | Comments

The US Government Accountability Office compared documented incident response actions to requirements set by the Federal Information Security Management Act of 2002 (FISMA) and National Institute of Standards and Technology (NIST) Special Publication 800-61, Computer Security Incident Handling Guide. The results were surprising.

TOPICS:

Germany Considers Replacing Email with Typewriters to Evade Spying

July 16, 2014 9:10 am | by Lisa Vaas | Comments

Germany is thinking about using manual typewriters to evade US snooping. According to The Guardian, the head of the Bundestag's parliamentary inquiry into National Security Agency (NSA) activity in Germany — Christian Democrat politican Patrick Sensburg - said in an interview with Morgenmagazin TV that he and his colleagues were considering tossing email completely.

TOPICS:

Pages

X
You may login with either your assigned username or your e-mail address.
The password field is case sensitive.
Loading