Advertisement
Network Forensics
Subscribe to Network Forensics

The Lead

Russia Caught Editing Wikipedia Entry about MH17

July 21, 2014 10:31 am | by Kadhim Shubber, Wired UK | News | Comments

Thanks to a Twitter bot that monitors Wikipedia edits made from Russian government IP addresses, someone from the All-Russia State Television and Radio Broadcasting Company (VGTRK) has been caught editing a Russian-language Wikipedia reference to MH17 in an article on aviation disasters.

The Dangers of Social Media in the Military

July 21, 2014 9:59 am | by Lance Cpl. Tyler Giguere, DVIDS | News | Comments

Common tactics of social media extortionists include relating to a service member’s interests...

Senate Hearing Looks to Cybercrime Law to Fight Botnets

July 17, 2014 10:19 am | by Sara Peters, Dark Reading | News | Comments

In the wake of Microsoft's seizure of No-IP servers and domains, private and public sector...

Global Law Enforcement, Security Firms Team Up, Take Down Shylock

July 11, 2014 11:21 am | by Sara Peters, Dark Reading | News | Comments

A month after the GameOver ZeuS sting, another bank fraud group's operations has been disrupted...

View Sample

SUBSCRIBE TO FREE DFI News EMAIL NEWSLETTER

Facebook Helps Cripple Greek Botnet

July 9, 2014 9:49 am | by Kelly Jackson Higgins, Dark Reading | News | Comments

Facebook has revealed details of how it helped derail a little-known botnet operation out of Greece that was used to steal and mine digital currency and spread via Facebook and Lightcoin mining — infecting some 250,000 machines worldwide. 

Operation Tovar: The Latest Attempt to Eliminate Key Botnets

July 8, 2014 4:16 pm | by Meaghan Molloy | Blogs | Comments

Coordinated botnet disruptions have increased in pace and popularity over the last few years as more private companies work with international law enforcement agencies to combat malware infections on a grand scale. Operation Tovar, announced on June 2 2014, is the latest to make headlines.

Police Dog Sniffs Out Child Porn Hard Drives

July 8, 2014 9:54 am | by Katie Mulvaney, Providence Journal | News | Comments

Rhode Island state police, through an Internet task force, are taking a new approach to finding those that traffic in child pornography. The recent arrival of golden Labrador Thoreau makes Rhode Island the second state in the nation to have a police dog trained to sniff out hard drives, thumb drives and other technological gadgets that could contain child pornography.

Advertisement

When Does Virtual Crime Become An Actual Crime?

July 2, 2014 8:18 am | News | Comments

In his mind and online persona, Gilberto Valle left little doubt about the depths of his depravation: In communications over the Internet, he imagined subjecting women he knew to sex-related torture and, in some cases, murder and cannibalism. However, the judge concluded that Mr. Valle’s Internet plotting had been “fantasy role play” and was not evidence of an actual crime.

NASA's Curiosity Rover Brought Earth BUG to Mars

June 30, 2014 5:15 am | by Darren Pauli | News | Comments

A 20 year old bug has been discovered in an algorithm so pervasive it's used in the Mars Curiosity rover, cars, aircraft, Android phones and a string of popular open source wares. The bug can be found in the Lempel-Ziv-Oberhumer (LZO) data compression algorithm created by Markus Oberhumer, who on Wednesday posted a new version 2.07 of the code and revealed the bug.

A South St. Paul burglar effectively updated his status to "busted" when he logged into Facebook on a computer in the home he is accused of breaking into, prosecutors say.

Burglar Fails to Log Off Facebook

June 27, 2014 1:17 pm | by Marino Eccher, Pioneer Press | News | Comments

A South St. Paul burglar effectively updated his status to "busted" when he logged into Facebook on a computer in the home he is accused of breaking into, prosecutors say.                       

Complaints originating from social media make up "at least half" of calls passed on to front-line officers

Social Media Calls Passed to Front-line Police in UK

June 24, 2014 12:43 pm | by Keith Moore, BBC | News | Comments

Complaints originating from social media make up "at least half" of calls passed on to front-line officers, a senior officer has told the BBC.                               

Network Forensics Makes an Impact at the Army’s NIE

June 23, 2014 8:56 am | by Capt. Ray Ragan | News | Comments

The U.S. Army Electronic Proving Ground traditionally provides expertise in instrumentation for technology-based systems and is the Army’s designated tester for C4ISR systems, as part of the Army Test and Evaluation Command. This year, in addition to supporting with instrumentation, USAEPG brought a network forensics team to the technology-centric field evaluation.

Advertisement
Investigators, lawyers and forensic analysts who handle child-pornography cases

Haunted Digital Investigations

June 19, 2014 12:40 pm | by Jason Nark, Philadelphia Daily News | News | Comments

No matter what they do to decompress, the investigators, lawyers and forensic analysts who handle child-pornography cases say they can't outrun the first image they saw on the job, let alone the thousands of other horrors their eyes and ears have witnessed.

Network investigations can be far more difficult than a typical computer examination

Network Investigations

June 19, 2014 12:16 pm | by Gary C. Kessler and Matt Fasulo | Articles | Comments

Network investigations can be far more difficult than a typical computer examination, even for an experienced digital forensics examiner, because there are many more events to assemble in order to understand the case and the tools do not do as much work for the examiner as traditional computer forensics tools.

The Army’s semi-annual, large-scale Network Integration Evaluation (NIE) saw the technology of network forensics make an impact at NIE 14.2, the latest NIE, which concluded earlier this month.

Network Forensics Makes an Impact at Army's NIE

June 17, 2014 1:17 pm | by Capt. Ray Ragan, DVIDS | News | Comments

The Army’s semi-annual, large-scale Network Integration Evaluation (NIE) saw the technology of network forensics make an impact at NIE 14.2, the latest NIE, which concluded earlier this month.                 

Evernote and Feedly are Recovering after Sustained Hacker Attacks

June 12, 2014 8:31 am | by Lily Hay Newman | Blogs | Comments

Evernote and Feedly — the popular note-taking app and RSS reader respectively — were both down for many hours on Wednesday because of a sustained hacker attack. Though the sites are starting to restore service, users may have still have intermittent problems.

New Pandemiya Trojan Emerges as Alternative to Zeus-based Variants

June 11, 2014 12:04 pm | by Eli Marcus | Blogs | Comments

Pandemiya is a new commercial Trojan malware application that has recently been promoted in underground forums as an alternative to more widely used Zeus Trojan and its variants. The fraudsters behind Pandemiya are currently advertising it for sale at a price of $1500 USD for the core application, or $2000 USD for the core application including plugins for additional functionality.

Advertisement

Vegas Police Killer's Video and Social Media Investigated

June 11, 2014 11:52 am | by Michelle Rindels and Justin Pritchard, Associated Press | News | Comments

Investigators in Las Vegas are studying YouTube videos and a range of other social media posts by Jerad Miller, as they try to untangle what led him and his 22-year-old wife to gun down two police officers and a civilian before taking their own lives.

Getting Smart about Fighting Cyber Crime

June 11, 2014 11:46 am | by Caitlin Dawson, Simon Fraser Univ. | News | Comments

When Ashleigh Girodat collects her BA in criminology in June she will have already made her mark in the fight against cyber crime. As part of a research team at SFU’s International Cybercrime Research Centre, Girodat analyses data from a web crawler that scans the open web for child-exploitation content.

Facebook Stupidity Leads to Largest Gang Bust in NYC History

June 9, 2014 10:27 am | by Lisa Vaas | Blogs | Comments

It was a long trail of quite helpful Facebook postings about crimes that lead New York City police to what authorities are calling "the largest gang takedown in New York City's history."                  

Taking Down One Botnet Killed 98% Of Australian Wire Fraud

June 4, 2014 10:24 am | by Luke Hopewell, Gizmodo Australia | News | Comments

For years the Microsoft Global Cybercrime Center, along with its 100 internet security spooks around the world — have worked to take down fraudulent software operations, botnets and baddies compromising the privacy and security of Microsoft customers. It was one particular botnet, however, that had a profound impact on the way Australians deal with their money online.

Book Excerpt: Social Media Investigation for Law Enforcement

June 3, 2014 9:02 am | by Joshua Brunty and Katherine Helenek | Articles | Comments

In order to effectively investigate crimes involving social media, it is imperative that law enforcement understand “how” social media is stored, “where” such information is stored and found, and “how” to obtain such information using forensically sound procedures. Social media requires a different mind-set to traditional investigative and current forensic methodologies. 

Iranian Hackers Spy with Fake Facebook Accounts

May 29, 2014 9:42 am | by Jim Finkle, Reuters | News | Comments

In an unprecedented, three-year cyberespionage campaign, Iranian hackers created false social networking accounts and a fake news website to spy on military and political leaders in the United States, Israel and other countries, a cyberintelligence firm has said.

SNMP DDoS Attacks Spike

May 23, 2014 9:41 am | by Kelly Jackson Higgins, Dark Reading | News | Comments

No botnet necessary: Yet another flavor of distributed denial-of-service (DDoS) attacks that doesn't require infecting PCs is on the rise.                                

Lack of Digital Trail Leaves Murder Unsolved

May 8, 2014 11:31 am | by Dan Morse, The Washington Post | News | Comments

Philip Welsh rose every morning to a pot of coffee, a half-pack of cigarettes and a seat behind his Smith Corona typewriter. No Internet and no cellphone. Just a 65-year-old man trying to make sense of the world through his poems and trying to connect to it through his letters.

Interpol, Philippines Bust Cyber Extortion Network

May 5, 2014 8:51 am | by Jim Gomez, Associated Press | News | Comments

Philippine police, backed by Interpol, have arrested dozens of suspected members of an online extortion syndicate who duped hundreds of victims worldwide into exposing themselves in front of webcams or engaging in lewd chats, including a Scottish teenager who committed suicide after being blackmailed.

Sefnit Botnet Swaps Tor for SSH

May 1, 2014 11:09 am | by Kelly Jackson Higgins, Dark Reading | News | Comments

A botnet that had confounded researchers by using the Tor anonymizing network has been spotted rearing its ugly head again — no longer under the cover of Tor, but now back with its original encrypted SSH model.         

Mobile Bots Grow 1,000% in 2013

April 28, 2014 11:51 am | by Infosecurity | News | Comments

The number of bad bots has grown exponentially in recent years, driving poor internet performance for individuals and the loss of control over connected devices; wholesale theft of online intellectual property, content and data; unnecessarily high bandwidth fees; and compromised websites that are otherwise key to mission-critical functions.

Virginia Governor Moves to Save Alicia’s Law

April 28, 2014 9:38 am | by PROTECT | News | Comments

Alicia’s Law, the popular anti-child pornography initiative believed to be dead in 2014, comes roaring back to life when the Virginia General Assembly votes on a surprise proposal by Governor Terry McAuliffe to save the legislation.     

X
You may login with either your assigned username or your e-mail address.
The password field is case sensitive.
Loading