Nuix has appointed experienced digital forensics investigator Chris Pogue as Senior Vice President for Cyber Threat Analysis. Pogue brings experience with Trustwave SpiderLabs, the IBM/ISS X-Force incident response and ethical hacking teams and the US Army Signal Corps to Nuix’s growing cybersecurity team.
Law enforcement agencies across the globe are taking a page out of the cybercriminal handbook, using targets' own phones and computers to spy on them with methods traditionally associated with the world's most malicious hackers, two computer security groups say.
Complaints originating from social media make up "at least half" of calls passed on to front-line officers, a senior officer has told the BBC.
AccessData and Gigaom Research have released a report on the growing complexities of mobile security and the limitations of “preventive, policy-driven” solutions that are not designed to detect and respond to mobile security incidents that bypass defenses.
Farsight Security, Inc., has emerged from stealth mode at the FIRST Conference in Boston, Massachusetts to debut Newly Observed Domains (NOD), a new set of data solutions that provide real-time actionable insights on young domain names.
The website of the news agency Reuters has been hacked by the Syrian Electronic Army (SEA) again - condemning the news site for publishing "false" articles about Syria. The SEA reportedly corrupted Taboola web ads on Reuters articles to redirect traffic to a page under the hackers' control.
Just recently published by no starch press, Penetration Testing: A Hands-On Introduction to Hacking can give you a solid -- practical, useful and insightful -- understanding of how hackers work and how you can use the same methods and tools to guard your systems against attack.
The four words float through a messy criminal case, two contentious lawsuits and multiple appeals to the Washington State Supreme Court filed over the past three years. “We can’t see her.” The four words refer to an ugly photo: one frame in an infamous series of child pornography images, familiar to those who collect them like baseball cards.
Kansas State University's cybersecurity center is receiving national recognition for its dedication to cutting-edge research. The university's Center for Information and Systems Assurance has been redesignated as a National Center of Academic Excellence in Information Assurance/Cyber Defense Research. The designation is from the U.S. Department of Homeland Security and the National Security Agency and is effective from 2014 to 2019.
The U.S. Army Electronic Proving Ground traditionally provides expertise in instrumentation for technology-based systems and is the Army’s designated tester for C4ISR systems, as part of the Army Test and Evaluation Command. This year, in addition to supporting with instrumentation, USAEPG brought a network forensics team to the technology-centric field evaluation.
No matter what they do to decompress, the investigators, lawyers and forensic analysts who handle child-pornography cases say they can't outrun the first image they saw on the job, let alone the thousands of other horrors their eyes and ears have witnessed.
Moscow-based Elcomsoft has developed a tool to collect iCloud backup files without knowing a person's Apple ID, a development intended to help law enforcement analyze seized computers.
A cheap brand of Chinese-made smartphones carried by major online retailers comes preinstalled with espionage software, a German security firm has said.
Researchers have discovered a crucial security problem in Google Play, the official Android app store. Secret keys in their apps software, similar to usernames/passwords info, can be used by anyone to maliciously steal user data or resources from service providers.
Companies that offer technologies for mobile forensics — the art of extracting digital evidence from smartphones — face a raft of challenges developing tools in today’s breakneck mobile device market.