Advertisement
 
The authoritative voice in forensic disciplines
Subscribe to MDT Magazine All

The Lead

Rehabilitation or Restitution? 79-Year-Old Reformed Fugitive Jailed

May 28, 2015 | by Sean Allocca, Editor | Articles | Comments

When U.S. marshals confronted convicted felon and longtime fugitive Frank Freshwaters outside his rusted mobile home in the backwaters of Melbourne, Fla. this week, they showed him a piece of evidence that he could no longer refute, according to reports—a picture of his mug shot from 1959.

TOPICS:
View Sample

SUBSCRIBE TO FREE
Forensic Magazine
EMAIL NEWSLETTER

SANS Institute has announced one of the industry's top forensic investigators, David Cowen, will teach SANS' popular FOR408: Windows Forensic Analysis course at SANS Minneapolis 2015 taking place July 20 – 25.

Digital Forensics Expert, David Cowen, to Present at SANS Minneapolis 2015

May 28, 2015 12:26 pm | by SANS Institute | News | Comments

SANS Institute has announced one of the industry's top forensic investigators, David Cowen, will teach SANS' popular FOR408: Windows Forensic Analysis course at SANS Minneapolis 2015 taking place July 20 – 25.

TOPICS:
A new worm targeting Linux routers is exploiting them not through a vulnerability per se, but rather by simply brute-forcing weak passwords. The malware, which researchers have dubbed Linux/Moose, could be used for a wide variety of purposes - including D

Moose Malware Uses Linux Routers for Social Network Fraud

May 28, 2015 11:56 am | by Sara Peters, Dark Reading | News | Comments

A new worm targeting Linux routers is exploiting them not through a vulnerability per se, but rather by simply brute-forcing weak passwords. The malware, which researchers have dubbed Linux/Moose, could be used for a wide variety of purposes - including DNS hijacking, DDoSing, and deep network penetration - but so far attackers only seem to be using it for tame social networking fraud.

TOPICS:
If you send a specific string of symbols and Arabic characters to another iPhone user, you can really ruin their day.

Watch Out! This Boobytrapped Text Message Will Turn Off Your iPhone

May 28, 2015 11:39 am | by Graham Cluley | Blogs | Comments

If you send a specific string of symbols and Arabic characters to another iPhone user, you can really ruin their day.

TOPICS:
Advertisement
Data leaks and other news events over the past few years have brought insider threats to the forefront of public attention, but most companies still lack the means or motivation to protect themselves from malicious insiders.

Why Insider Threats are Succeeding

May 28, 2015 11:16 am | by TK Keanini, Help Net Security | News | Comments

Data leaks and other news events over the past few years have brought insider threats to the forefront of public attention, but most companies still lack the means or motivation to protect themselves from malicious insiders.

P2 Commander v4.1

May 28, 2015 10:44 am | Paraben Corporation | Product Releases

P2C v4.1 adds OCR support in indexing, file viewing, and searching. It also adds an RTF report, EXIF info to reports, and more. P2C is a comprehensive digital forensic examination tool with special focus on email, chat logs, internet history, registry data, and more. Not only is P2C affordable, you receive free video training with every license.

TOPICS:
When a corporation needs a file for litigation, it might not turn to a digital forensic investigator. Software-as-a-Service (SaaS) could get the job done. Collecting files in a forensically-sound manner, a cousin to digital forensic imaging, provides a wa

SaaS Makes Corporate eDiscovery Fast, Easy, Adds to DFI Toolbox

May 28, 2015 9:54 am | by Ernie Austin, Associate Editor | Articles | Comments

When a corporation needs a file for litigation, it might not turn to a digital forensic investigator. Software-as-a-Service (SaaS) could get the job done. Collecting files in a forensically-sound manner, a cousin to digital forensic imaging, provides a way for a corporation to prepare e-discovery information for civil litigation. SaaS can also give forensic practitioners an additional way to collect information. 

TOPICS:

New Human Ancestor Added to Family Tree

May 27, 2015 1:07 pm | by Seth Augenstein, Digital Reporter | Articles | Comments

New upper and lower jaw fossils were unearthed from the Afar region of Ethiopia four years ago, and were then described as a separate species by an international scientific team at The Cleveland Museum of Natural History

TOPICS:

FIFA Officials Arrested on Corruption Charges in Zurich

May 27, 2015 12:17 pm | by Sean Allocca, Editor | Articles | Comments

The Swiss officers worked in conjunction with the U.S. Department of Justice, which unsealed a 47-count indictment, early Wednesday, charging 14 defendants with racketeering and other offenses stemming back to the early 1990s.

TOPICS:
Advertisement
Although the cybercrime game is dominated by organized criminals - according to IBM X-Force, 80 percent of cyber attacks are driven by highly organized crime rings - there are one-man operations getting a piece of the action, too.

Profile of a Cybercrime Petty Thief

May 27, 2015 11:10 am | by Sara Peters | Blogs | Comments

Although the cybercrime game is dominated by organized criminals - according to IBM X-Force, 80 percent of cyber attacks are driven by highly organized crime rings - there are one-man operations getting a piece of the action, too.

TOPICS:
South African security firm Thinkst is hoping to give new life to an old idea — the honeypot — in a bid to help organizations detect security breaches and intruders in their private networks.

Canary Box Aims to Lure Hackers Into Honeypots Before They Make Headlines

May 27, 2015 10:37 am | by Peter Bright, Ars Technica | News | Comments

South African security firm Thinkst is hoping to give new life to an old idea — the honeypot — in a bid to help organizations detect security breaches and intruders in their private networks.

TOPICS:
The Anoka County Sheriff’s Office has a new tool to quickly gather digital evidence at crime scenes.

County Sheriff's Office Has Minnesota's First Mobile Digital Forensics Lab

May 27, 2015 9:50 am | by Karen Zamora, Star Tribune | News | Comments

The Anoka County Sheriff’s Office has a new tool to quickly gather digital evidence at crime scenes.

TOPICS:
The average consolidated total cost of a data breach is $3.8 million, according to a Ponemon Institute study of 350 companies spanning 11 countries.

Total Cost of Average Data Breach Reaches $3.8 Million

May 27, 2015 9:12 am | by Mirko Zorz, Help Net Security | News | Comments

The average consolidated total cost of a data breach is $3.8 million, according to a Ponemon Institute study of 350 companies spanning 11 countries.

TOPICS:
Sophisticated criminals used an online service run by the IRS to access personal tax information from more than 100,000 taxpayers, part of an elaborate scheme to steal identities and claim fraudulent tax refunds, the IRS said Tuesday.

IRS Says Thieves Stole Tax Info From 100,000

May 27, 2015 8:47 am | by Stephen Ohlemacher, Associated Press | News | Comments

Sophisticated criminals used an online service run by the IRS to access personal tax information from more than 100,000 taxpayers, part of an elaborate scheme to steal identities and claim fraudulent tax refunds, the IRS said Tuesday.

TOPICS:

NIST to Fund $20M National Forensic Science Center at Iowa State

May 26, 2015 4:43 pm | by Seth Augenstein, Digital Reporter | Articles | Comments

The Forensic Science Center of Excellence, which could help set national standards about how evidence is handled and presented, will be created with a five-year grant award that is worth up to $20 million.

TOPICS:

B.B. King Poisoned to Death, Daughters Claim

May 26, 2015 3:09 pm | by Seth Augenstein, Digital Reporter | Articles | Comments

The two daughters, Karen Williams and Patty King, provided affidavits to various media outlets claiming the two assistants had administered harmful treatments to the 89-year-old which caused diabetic shock.

TOPICS:

Pages

Advertisement
X
You may login with either your assigned username or your e-mail address.
The password field is case sensitive.
Loading