Advertisement
Blogs
Subscribe to DFI News

The Lead

Hackers Plundered Israeli Defense Firms that Built 'Iron Dome' Missile Defense System

July 30, 2014 | by Editor | Comments

Three Israeli defense contractors responsible for building the “Iron Dome” missile shield currently protecting Israel from a barrage of rocket attacks were compromised by hackers and robbed of huge quantities of sensitive documents pertaining to the shield technology.

TOPICS:
View Sample

SUBSCRIBE TO FREE
DFI News
EMAIL NEWSLETTER

I'm writing this review as someone who has used Volatility for some time, albeit not to it's fullest possible extent. I'm more of an incident responder, and not so much a malware reverse engineer; I tend to work with some really good malware RE folks and

Book Review: 'The Art of Memory Forensics'

July 30, 2014 3:23 pm | by Harlan Carvey | Comments

I'm writing this review as someone who has used Volatility for some time, albeit not to it's fullest possible extent. I'm more of an incident responder, and not so much a malware reverse engineer; I tend to work with some really good malware RE folks and usually go to them for the deeper stuff. 

TOPICS:
Every law firm can run into incidents of employee misconduct, data breaches, and intellectual property theft. In the age of modern technology, data breaches, insider trading, and other security problems require extensive technological forensics.

Data Breaches, eDiscovery, and the Importance of Digital Forensics

July 29, 2014 9:07 am | by Editor | Comments

Every law firm can run into incidents of employee misconduct, data breaches, and intellectual property theft. In the age of modern technology, data breaches, insider trading, and other security problems require extensive technological forensics.

TOPICS:
Cybersecurity is being pushed in two directions. On the one hand, the growing complexity of information systems and the onslaught of threats facing them are putting a premium on speed. Automation is the future of security.

Security Automation: Are Humans Still Relevant?

July 28, 2014 10:38 am | by William Jackson | Comments

Cybersecurity is being pushed in two directions. On the one hand, the growing complexity of information systems and the onslaught of threats facing them are putting a premium on speed. Automation is the future of security.       

TOPICS:
Advertisement
Recently, a hacker who's been campaigning to make a point about Apple security by playing fast and loose with the now widely-accepted definition of "backdoor" struck gold when journalists didn't do their homework and erroneously reported a diagnostic mech

The Apple Backdoor that Wasn't

July 28, 2014 9:04 am | by Violet Blue | Comments

Recently, a hacker who's been campaigning to make a point about Apple security by playing fast and loose with the now widely-accepted definition of "backdoor" struck gold when journalists didn't do their homework and erroneously reported a diagnostic mechanism as a nefarious, malfeasant, secret opening to their private data.

TOPICS:
As I mentioned in my previous post on this topic, there were two other tests that I wanted to conduct with respect to file system operations and the effects an analyst might expect to observe within the MFT, and the USN change journal.

File System Ops, Testing Phase 2

July 25, 2014 9:43 am | by Corey Harrell | Comments

As I mentioned in my previous post on this topic, there were two other tests that I wanted to conduct with respect to file system operations and the effects an analyst might expect to observe within the MFT, and the USN change journal.    

TOPICS:
Ever posted a picture of your cat online? Unless your privacy settings avoid making APIs publicly available on sites like Flickr, Twitpic, Instagram or the like, there's a cat stalker who knows where your liddl' puddin' lives, and he's totally pwned your

Cat Stalker Knows Where Your Kitty Lives (and It's Your Fault)

July 25, 2014 9:29 am | by Lisa Vaas | Comments

Ever posted a picture of your cat online? Unless your privacy settings avoid making APIs publicly available on sites like Flickr, Twitpic, Instagram or the like, there's a cat stalker who knows where your liddl' puddin' lives, and he's totally pwned your pussy by geolocating it.

TOPICS:

European Central Bank Suffers Security Breach, Personal Data Stolen

July 24, 2014 9:57 am | by Charlie Osborne | Comments

The European Central Bank (ECB) admitted Thursday that a security breach has led to the theft of personal data.                                       

TOPICS:
I recently conducted some testing of different actions on a Windows 7 system, with the specific purpose of identifying artifacts within the file system (in this case, the MFT and the USN change journal), particularly within individual records.

File System Ops, Effects on MFT Records

July 24, 2014 8:17 am | by Corey Harrell | Comments

I recently conducted some testing of different actions on a Windows 7 system, with the specific purpose of identifying artifacts within the file system (in this case, the MFT and the USN change journal), particularly within individual records. 

TOPICS:
Advertisement
The Wall Street Journal was forced to take systems offline following a security breach, as yet another online publication suffers cyber attack.

Hacker Worms His Way into WSJ Computer Systems

July 23, 2014 10:07 am | by Charlie Osborne | Comments

The Wall Street Journal was forced to take systems offline following a security breach, as yet another online publication suffers cyber attack.                             

TOPICS:
I put together a python script that parses out several plist files related to Safari Internet History. Since the iPhone also uses Safari, I decided to expand the script to parse some iPhone Safari artifacts.

Safari and iPhone Internet History Parser

July 23, 2014 9:32 am | by Mari DeGrazia | Comments

I put together a python script that parses out several plist files related to Safari Internet History. Since the iPhone also uses Safari, I decided to expand the script to parse some iPhone Safari artifacts.            

TOPICS:

Gmail Account is Fair Game, Says US Judge

July 22, 2014 9:49 am | by Lisa Vaas | Comments

A New York court opened up our entire Gmail accounts to feds or cops with warrants, in spite of two recent decisions that went against similar requests.                           

TOPICS:

Forensic Scientist Identifies 'Back Doors' Running on iOS

July 21, 2014 2:25 pm | by Jason O'Grady | Comments

Forensic scientist and author Jonathan Zdziarski has posted the slides from his talk at the Hackers On Planet Earth (HOPE/X) conference in New York called Identifying Backdoors, Attack Points, and Surveillance Mechanisms in iOS Devices.  

TOPICS:

Criminal Software, Government-grade Protection

July 21, 2014 9:43 am | by Quentin Hardy | Comments

Researchers at a software security company say they have found a popular type of criminal software inside an extremely sophisticated “evasion code,” which they say was previously used by Russia to spy on one or more Eastern European governments.

TOPICS:

NIST's Future without the NSA

July 21, 2014 8:40 am | by Brian Robinson | Comments

Will the National Institute of Standards and Technology break its close relationship with the National Security Agency in developing cryptographic and cybersecurity standards? That seems very likely following a recent report by an outside panel of experts, and it will have implications for federal agencies.

TOPICS:

Android Has Some Words with Monkey

July 18, 2014 8:03 am | by Editor | Comments

The recent NIST Mobile Forensics Webcast and SANS FOR585 poster got monkey thinking about using the Android emulator for application artefact research. By using an emulator, we don't need to "root" an Android device in order to access artifacts from the protected data storage area.  

TOPICS:

Pages

X
You may login with either your assigned username or your e-mail address.
The password field is case sensitive.
Loading