No matter what they do to decompress, the investigators, lawyers and forensic analysts who handle child-pornography cases say they can't outrun the first image they saw on the job, let alone the thousands of other horrors their eyes and ears have witnessed.
Moscow-based Elcomsoft has developed a tool to collect iCloud backup files without knowing a person's Apple ID, a development intended to help law enforcement analyze seized computers.
A cheap brand of Chinese-made smartphones carried by major online retailers comes preinstalled with espionage software, a German security firm has said.
Researchers have discovered a crucial security problem in Google Play, the official Android app store. Secret keys in their apps software, similar to usernames/passwords info, can be used by anyone to maliciously steal user data or resources from service providers.
Companies that offer technologies for mobile forensics — the art of extracting digital evidence from smartphones — face a raft of challenges developing tools in today’s breakneck mobile device market.
The nationwide shortage of cybersecurity professionals — particularly for positions within the federal government — creates risks for national and homeland security, according to a new study from the RAND Corporation.
The internet trade in images that show child sex abuse is now "an epidemic," according to the head of the global initiative to combat the problem. Police officers from around the world serve on the Virtual Global Taskforce.
A Tennessee man was arrested and charged with federal computer hacking for allegedly conspiring to launch cyber attacks on two universities and three companies since last summer, federal law enforcement officials have announced. The defendant is allegedly associated with a group of individuals, known as “NullCrew."
University of New Haven students will join the national effort to combat cybercrime now that the university has become one of just 13 colleges nationwide, and the first in Connecticut, to form a partnership with the Defense Cyber Crime Center (DC3).
Pittsburgh has become the arsenal of cybersecurity. It is home to CMU’s Software Engineering Institute with its 260-person CERT cyber team, and the FBI has placed a nonprofit training alliance here, assigning a data warrior to its helm.
The Army’s semi-annual, large-scale Network Integration Evaluation (NIE) saw the technology of network forensics make an impact at NIE 14.2, the latest NIE, which concluded earlier this month.
The UK’s National Crime Agency has claimed that PC users have until midnight local time on Tuesday to clean their machines and improve defences against notorious malware GameoverZeus and CryptoLocker.
The Bitcoin digital currency system is in danger of losing its credibility as an independent payment system because of the growing power of a group that runs some of the computers behind it.
In Android Anti-forensics: Modifying CyanogenMod, Karl-Johan Karlsson and William Bradley Glisson present a version of the Cyanogenmod alternate operating system for Android devices, modified so that it generates plausible false data to foil forensic analysis by law enforcement.
The explosive growth in both the use and capacity of smartphones has led to a sea change in digital forensics, creating technology challenges for the justice and law enforcement communities and raising legal questions that in some cases have gone to the Supreme Court.