Over the past few years, there have been several high-profile cyber crimes against large companies, including Target and Home Depot, that have resulted in little, if no, consequences for the criminals. So, how often do hackers get caught?
A new REMnux project initiative provides Docker images...
For more than a decade, a powerful app called Metasploit has been the most important tool in the...
Depending upon the nature of investigations, timely forensic examinations normally can expedite...
Dakota county is creating the first local Electronic Crimes Task Force based in Minnesota. Ten agencies — nine city police departments and the sheriff’s office — will participate in the group, which will begin operating next month.
Google has blacklisted more than 11,000 domains involved in the latest malware campaign from SoakSoak.ru. But, the impact is apparently much larger: it seems to be affecting most hosts across the WordPress hosting spectrum, according to researchers.
Criminal hackers are actively exploiting the critical shellshock vulnerability to install a self-replicating backdoor on a popular line of storage systems, researchers have warned.
This is the conclusion of our discussion with Jake Williams, Instructor at SANS Institute. We've discused North Korea's involvement, or lack of involvement, in the Sony breach, but who else might have been involved? And what is Sony doing to find out? Also, Jake lets us know from a digital-forensic perpective what could be done in situtations like this in the future.
SiQuest was voted "Industry Innovator 2014" by SC Magazine under the category of Analysis and Testing for the evaluation and performance of their new Internet Examiner® Toolkit forensic software.
Researchers from Universidad Carlos III de Madrid (UC3M) and the Universidad de Málaga (UMA) have collaborated with the consulting and technology company Indra on the development of a new advanced simulator of training in cybersecurity, a system that teaches users how to carry out computer forensics, prevent cyber attacks and learn techniques of cyber defense.
The Sony breach has given a great deal of attention to North Korea. Regardless of whether the insular country had a part in the attack or not, our continuing discussion with SANS Instructor, Jake Williams, touched on its capabilities.
At first glance, it would seem that the most logical and obvious way to increase storage capacity would be to add more platters to a hard drive. However, this raises a number of inherent problems, such as having to increase the size beyond the current form factors (3.5”, 2.5”, etc.), escalating the cost per hard drive, having to have more read/write heads per hard drive, and so forth.
The UK Government is launching a Child Abuse Image Database. It is a landmark project for law enforcement. Never before has UK law enforcement had such a sophisticated method of sharing and matching critical case data, logging visual evidence and analyzing digital media.
In an attempt to understand what has happened during the breach of Sony Picture's computers, DFI News has contacted SANS Institute's DFIR team. In an email interview, Jake Williams, an Instructor at SANS, provides his insights into the complex digital forensic story unfolding at Sony.
Two new surveys show how easy enterprises make it for attackers to steal vast quantities of data with just a few successful breaches of employee machines: Employees typically are given far more access to sensitive data than they need to get their jobs done, and enterprises don't do enough to track access behavior.
The popular file-sharing service Pirate Bay was taken down following a raid in Sweden by police who seized servers and computers.
The spies had come without warning. They plied their craft silently, stealing secrets from the world’s most powerful military. They were at work for months before anyone noticed their presence. And when American officials finally detected the thieves, they saw that it was too late. The damage was done.
To increase hard drive storage capacity, manufacturers have been able to decrease the size of magnetic grains which comprise data bits. This allows for a greater number of bits of data to be recorded. However, the grains are so small that they can potentially interfere with each other. This diminishes their ability to maintain assigned magnetic orientations and data would become corrupted, leading to an unreliable and unusable hard drive.
A Turlock, California man who was the subject of a Homeland Security investigation involving a child pornography ring will be spending the next three decades behind bars.
The theft of trade secrets in U.S. businesses is increasing rapidly and is expected to double within the next decade, according to a recent report. These incidents and other suspicious behavior are the catalyst for lengthy, expensive forensic investigations. Digital forensic investigators will seek evidence from a wide array of devices and data sources, including mobile devices.
The field of incident response, forensics, and malware analysis is full of thrilling hunts and exciting investigations where you have an opportunity to aggressively pursue the activities of adversaries. While technical acumen certainly supports these efforts, a truly successful execution requires both a well-crafted process and detailed documentation of the journey through that process.
The University at Albany School of Business has been selected to host a research laboratory designed to improve exploration into cyber security and incident response. Computer forensic leader, The ARC Group of New York (ARC), has donated software and services valued at more than a half million dollars to support this critical endeavor.
Paraben has announced the release of Device Seizure v6.8 and P2 Commander v3.7. Here is what is new with these flagship tools at Paraben. Paraben is planning new releases in January 2015 for DS 7 and P2C 4 with completely new interfaces and an exciting list of new features.
When compared to a typical hard drive, SSDs are totally different in design and functionality which leads to some difficult issues to deal with pertaining to their forensic analysis.
As digital devices continue to proliferate, digital storage capacities are approximately doubling every two years. The sheer amount of digital media being submitted for forensic analysis is overwhelming.
Once again the Paraben team has put together just the right Forensic Innovation Environment with a perfect backdrop. The conference provides a brainshare and the perfect mix of lectures, trainings, and lab sessions that truly generate a spirit of collaboration and innovation that is forging new partnerships.
Most stories about child pornography focus on high-profile offenders such as priests and college professors or on attempts by victims to recover damages from offenders. Fewer stories focus on the people who voluntarily enter this world to catch the offenders and save some of the victims.
Security is a combination of protection, detection, and response. It's taken the industry a long time to get to this point, though. The 1990s was the era of protection. Our industry was full of products that would protect your computers and network. By 2000, we realized that detection needed to be formalized as well, and the industry was full of detection products and services. This decade is one of response.
There are few things more frustrating to users than using a tool which doesn't support (or may even be at odds with) their processes. Tools should be designed to support our workflows, and the more often we perform a workflow, the more important it is that our tools support it.
- Page 1