Advertisement
Topics
Subscribe to Topics

The Lead

Contact Opposing Counsel After Inadvertent Disclosure

October 24, 2014 9:53 am | by Joshua Gilliland, Esq. | Blogs | Comments

What happens when a lawyer inadvertently produces an attorney protected by the attorney-client privilege? A Magistrate Judges and District Court Judge orders the receiving party to destroy the inadvertently produced email.

 

White Hat Hackers Employed to Find Vulnerabilities

October 24, 2014 9:42 am | News | Comments

Cyber-crime is big business in the digital age, so a Bay Area security firm has hired a...

Carmakers Ignore Hacking Risk

October 24, 2014 9:37 am | News | Comments

As high-tech features like adaptive cruise control, automatic braking and automatic parallel...

Microsoft PowerPoint as an Attack Vector

October 24, 2014 9:34 am | News | Comments

Microsoft is scrambling to issue a Windows update after security researchers discovered a flaw...

View Sample

SUBSCRIBE TO FREE DFI News EMAIL NEWSLETTER

Cloud Computing Presents a Unique Forensic Challenge

October 23, 2014 8:00 pm | Articles | Comments

Cloud computing raises some unique law enforcement concerns regarding the location of potential digital evidence, its preservation, and its subsequent forensic analysis. Further forensic issues concern the potential effect the cloud services could have on the digital data itself and how the forensic examiner can explain all these indiscretions to the court.

One should not expect to find all user information sitting in the default folder or default location for a given type of file (e.g. Application Data or similar folder). Searching the entire hard disk is required in order to locate all unencrypted log and

FAA Seeks App to Preserve Digital Evidence

October 23, 2014 12:01 pm | News | Comments

To help with the collection, management, protection and preservation of digital forensic evidence, the Federal Aviation Administration is turning to industry. In an Oct. 15 posting, the FAA said it's seeking a commercial off-the-shelf application that will create a remotely accessible depository where digital media analysts can store digital forensic evidence and distribute forensic workload among investigators.

Your medical information is worth 10 times more than your credit card number on the black market. Security experts say cyber criminals are increasingly targeting the $3 trillion U.S. healthcare industry, which has many companies still reliant on aging com

US Investigating Cybersecurity Flaws in Medical Devices

October 23, 2014 11:52 am | News | Comments

The U.S. Department of Homeland Security is investigating about two dozen cases of suspected cybersecurity flaws in medical devices and hospital equipment that officials fear could be exploited by hackers, a senior official at the agency told Reuters.

Advertisement
How are ex-military and ex-hackers different? For starters, security guys with a military background are more likely to have a “traditional career.” This typically includes a degree from a four-year university, a series of jobs with certifications, and fo

Americans Fear Hackers More than Guns

October 23, 2014 11:37 am | News | Comments

The poll of 1,500 Americans conducted by Chapman University in Orange, California, found that walking alone down a dark street is the situation that has Americans most fearful – beating the fear of identity theft in second place, and the fear of being unsafe online in third place.

Four Ways Snowden Got it Wrong

October 23, 2014 11:29 am | by Dave Aitel | Blogs | Comments

As a former ‘research scientist’ at the National Security Agency, I feel compelled to respond to James Bamford’s exclusive interview with Edward Snowden that appeared in the September issue of Wired magazine. Many of the factual assertions about the NSA and intelligence community that were included in Bamford’s article, and previous Snowden “disclosures,” are highly questionable.

How to Collect Internet Evidence

October 22, 2014 8:00 pm | Articles | Comments

The courts have generally accepted evidence collected from the Internet as long as its authenticity can be established. Commonly accepted digital forensic methodologies can all be used to identify a three-pronged approach to Internet forensics.

Timeline Analysis by Categories

October 22, 2014 11:24 am | by Corey Harrell | Blogs | Comments

"Corey, at times our auditors find fraud and when they do sometimes they need help collecting and analyzing the data on the computers and network. Could you look into this digital forensic thing just in case if something comes up?" This simple request is what lead me into the digital forensic and incident response field. In this post I'm highlighting how this type of organization is applied to timeline analysis leveraging Plaso.

In this blog post we'll be looking at a new type of malware for Android phones that encrypts important files and demands the user pay a ransom to regain access to their phone.

Android Images Can Conceal Code

October 22, 2014 11:12 am | News | Comments

Someone's found (yet) another nasty security flaw in Android, by crafting a way to pack malicious software to look like images. The good news is that disclosure was kept back until Google had put a fix in place; the bad news is, of course, the huge number of phone-owners who never update – either through choice, ignorance or that their handset-maker holds back upgrades.

Advertisement

Justice Department Expands Fight Against Cybercrime

October 22, 2014 11:08 am | News | Comments

The Justice Department is expanding its National Security division to take on threats to the country from state-sponsored economic espionage and cybercrime, assistant attorney general for national security John Carlin said Tuesday.

Canada to Deport Alleged Anonymous Hacker

October 22, 2014 10:40 am | News | Comments

Matt DeHart, an American who believes the United States is pursuing sham child-porn charges against him as cover for a national security investigation, has been ordered deported from Canada. The 30-year-old faces up to 25 years in prison if convicted of child pornography charges in Tennessee.

Can You Ask the Court to Order a Party to Follow the Duty to Preserve?

October 21, 2014 8:52 am | by Joshua Gilliland, Esq. | Blogs | Comments

There are no shortage of cases where the duty to preserve has gotten attorneys and parties a like in trouble. However, it is difficult to ask a Court to order a party to “follow the rules,” because the party already has a duty to so. However, if there is evidence of wrongdoing by the party that was subject to the duty to preserve, the outcome could be different.

Cost of Cybercrime on the Rise

October 21, 2014 6:57 am | News | Comments

According to the 2014 Cost of Cyber Crime Study, the average annualized cost of cybercrime has reached $12.7 million in the U.S., a 96 percent increase since the study was launched five years ago.                    

While Android phones are constantly targeted by cyber criminals, the iPhone is considered more secure. Now, leaked documents from one of the world's leading surveillance companies have reaffirmed the idea.

Chinese Government Hacking iPhones?!?

October 21, 2014 6:54 am | News | Comments

Chinese authorities just launched “a malicious attack on Apple” that could capture user names and passwords of anyone who logs into the iCloud from anywhere in the country, the well-respected censorship watchdog GreatFire.org reports. With that information, a hacker can view users contacts, photos, messages and personal information stored in the cloud.  

Advertisement
A two-stage financial attack has been discovered that targets multiple ATMs around the world, including Latin America, Europe and Asia, allowing attackers to remove money via direct manipulation and steal millions of dollars.

500 Million Financial Records Hacked over 12 Months

October 21, 2014 6:39 am | News | Comments

Federal officials warned companies Monday that hackers have stolen more than 500 million financial records over the past 12 months, essentially breaking into banks without ever entering a building.                                                                    

NetClean Helps UK Home Office Fight Child Abuse

October 21, 2014 6:21 am | News | Comments

NetClean has announced that it has successfully collaborated with its partners, Hubstream and L-3 ASA, to implement the first phase of the UK’s national Child Abuse Image Database (CAID). The CAID plays a key part in delivering on the UK government’s promise to create a central repository for consolidating data in cases of child sexual abuse material.

Investigator Turns Eyewitness

October 20, 2014 8:21 pm | by Benjamin Wright | Articles | Comments

In today’s world of social media, investigators are taking on a new role; they are becoming a form of eyewitness. As the eyewitness, an investigator observes evidence that might not be visible to any other available investigator. The investigator is wise to create a record of what he or she sees at any particular point in time, including print outs of screenshots.  

High Schools Add Cyber Security Curriculum

October 20, 2014 11:34 am | News | Comments

Staying abreast of global trends in the digital world, educators in Richmond and Co­lumbia counties are working to create new coursework that will train high school students to protect computer networks from security threats.              

Can Apple Pay Thwart the Credit Card Hacking Trend?

October 20, 2014 11:27 am | by Evan Niu | Blogs | Comments

Over the past year or so, we've seen some of the most pervasive and widespread credit card security breaches at many of the nation's largest retailers. With Apple's new Apple Pay service launching on Monday alongside a slew of security features, it comes at the perfect time.  

Model Helps Set Up Police Sting to Catch Hacker

October 20, 2014 11:23 am | News | Comments

A hacker obtained nude photographs of a California model through Apple's iCloud and gave her two choices: pay up or have your private photos distributed to the world. The hacker reportedly bragged about hacking into celebrity accounts and leaking nude photos before demanding $900 from the model or else he'd 'ruin her modeling career.' 

Jasper Duplicator Series

October 20, 2014 11:18 am | Addonics Technologies | Product Releases | Comments

Addonics Technologies announced the Jupiter series of drive duplicators that, unlike traditional duplicators designed for a fixed number of targets, allow you to connect multiple units together. The Jasper Duplicator offers high performance 150 MB/sec copy speed depending on the read/write speed of the source and target media. 

Even as the U.S. Air Force Academy has reduced the number of majors it offers recently, it has instituted a new program aimed at helping the Air Force fly, fight and win in cyberspace.

GIAC Network Forensic Analyst Certification

October 20, 2014 11:13 am | News | Comments

A new forensics certification, the GIAC Network Forensic Analyst, validates that professionals who hold this credential are qualified to perform examinations employing network forensic artifact analysis and demonstrate an understanding of network forensics, normal and abnormal conditions for common network protocols, the process and tools used to examine device and system logs, wireless communication, and encryption protocols.

Old Phone Fraud Finds New Life in VOIP

October 20, 2014 11:06 am | News | Comments

Bob Foreman’s architecture firm was the victim of an age-old fraud that has found new life now that most corporate phone lines run over the Internet. Hackers had broken into the phone network of the company, Foreman Seeley Fountain Architecture, and routed $166,000 worth of calls from the firm to premium-rate telephone numbers in Gambia, Somalia and the Maldives.

Businesses of all sizes seem to be moving at least some operations to the cloud. It’s only a matter of time before you get a phone call asking you to conduct some kind of cloud forensics and/or incident response.

Forensics in the Amazon Cloud

October 17, 2014 10:19 am | by Editor | Blogs | Comments

Businesses of all sizes seem to be moving at least some operations to the cloud. It’s only a matter of time before you get a phone call asking you to conduct some kind of cloud forensics and/or incident response.           

Security researchers have warned of a serious security flaw in Android which could potentially leave every device open to attack.

Binder Could Blow Apart Android Security

October 17, 2014 10:03 am | by Phil Muncaster, Infosecurity Magazine | News | Comments

Security researchers have warned of a serious security flaw in Android which could potentially leave every device open to attack.                                 

US-CERT released an advisory warning users about email scams and cyber campaigns using the Ebola virus disease as a theme.

Beware Ebola-themed Phishing, Malware and Hoaxes

October 17, 2014 9:53 am | by Zeljka Zorz, Help Net Security | News | Comments

US-CERT released an advisory warning users about email scams and cyber campaigns using the Ebola virus disease as a theme.                                     

X
You may login with either your assigned username or your e-mail address.
The password field is case sensitive.
Loading