Ever posted a picture of your cat online? Unless your privacy settings avoid making APIs publicly available on sites like Flickr, Twitpic, Instagram or the like, there's a cat stalker who knows where your liddl' puddin' lives, and he's totally pwned your pussy by geolocating it.
Cookies are an essential part of the way the web works and occupy a pivotal position in the...
Every law firm can run into incidents of employee misconduct, data breaches, and intellectual...
Recently, a hacker who's been campaigning to make a point about Apple security by playing fast and loose with the now widely-accepted definition of "backdoor" struck gold when journalists didn't do their homework and erroneously reported a diagnostic mechanism as a nefarious, malfeasant, secret opening to their private data.
As I mentioned in my previous post on this topic, there were two other tests that I wanted to conduct with respect to file system operations and the effects an analyst might expect to observe within the MFT, and the USN change journal.
The European Central Bank (ECB) admitted Thursday that a security breach has led to the theft of personal data.
I recently conducted some testing of different actions on a Windows 7 system, with the specific purpose of identifying artifacts within the file system (in this case, the MFT and the USN change journal), particularly within individual records.
The Wall Street Journal was forced to take systems offline following a security breach, as yet another online publication suffers cyber attack.
I put together a python script that parses out several plist files related to Safari Internet History. Since the iPhone also uses Safari, I decided to expand the script to parse some iPhone Safari artifacts.
A New York court opened up our entire Gmail accounts to feds or cops with warrants, in spite of two recent decisions that went against similar requests.
Forensic scientist and author Jonathan Zdziarski has posted the slides from his talk at the Hackers On Planet Earth (HOPE/X) conference in New York called Identifying Backdoors, Attack Points, and Surveillance Mechanisms in iOS Devices.
Researchers at a software security company say they have found a popular type of criminal software inside an extremely sophisticated “evasion code,” which they say was previously used by Russia to spy on one or more Eastern European governments.
Will the National Institute of Standards and Technology break its close relationship with the National Security Agency in developing cryptographic and cybersecurity standards? That seems very likely following a recent report by an outside panel of experts, and it will have implications for federal agencies.
The recent NIST Mobile Forensics Webcast and SANS FOR585 poster got monkey thinking about using the Android emulator for application artefact research. By using an emulator, we don't need to "root" an Android device in order to access artifacts from the protected data storage area.
The term live response is being heard more and more frequently but what exactly is it and how does it differ from traditional forensics.
Google has hired a prolific hacker by the name of George Hotz to join the Project Zero team. Hotz is well-known for hacking Sony's PlayStation 3 and Apple's iPhone.
The US Government Accountability Office compared documented incident response actions to requirements set by the Federal Information Security Management Act of 2002 (FISMA) and National Institute of Standards and Technology (NIST) Special Publication 800-61, Computer Security Incident Handling Guide. The results were surprising.
Germany is thinking about using manual typewriters to evade US snooping. According to The Guardian, the head of the Bundestag's parliamentary inquiry into National Security Agency (NSA) activity in Germany — Christian Democrat politican Patrick Sensburg - said in an interview with Morgenmagazin TV that he and his colleagues were considering tossing email completely.