Advertisement
 
Blogs
Subscribe to Forensic Magazine

The Lead

Prolific researcher Kafeine today called for Windows users to disable Adobe Flash Player in the wake of his discovery of an exploit for a previously unknown Flash flaw being packaged with a notorious crimeware kit.

Adobe Investigating New Flash Zero-Day Spotted in Crimeware Kit

January 22, 2015 | by Kelly Jackson Higgins | Comments

Prolific researcher Kafeine today called for Windows users to disable Adobe Flash Player in the wake of his discovery of an exploit for a previously unknown Flash flaw being packaged with a notorious crimeware kit.          

TOPICS:
View Sample

SUBSCRIBE TO FREE
Forensic Magazine
EMAIL NEWSLETTER

For more than two decades, law enforcement agencies have used data to figure out crime patterns and target “hot spots” in communities. Now a growing number of police departments are going further by making some of that information available to the public

Touting Prevention, Police Put Crime Info Online

January 20, 2015 2:37 pm | by Jenni Bergal | Comments

For more than two decades, law enforcement agencies have used data to figure out crime patterns and target “hot spots” in communities. Now a growing number of police departments are going further by making some of that information available to the public online.

TOPICS:
Malvertising accounts for huge amounts of cyber fraud and identity theft. Yet there is still no consensus on who is responsible for addressing these threats.

The Truth About Malvertising

January 20, 2015 12:47 pm | by Peter Zavlaris | Comments

Malvertising accounts for huge amounts of cyber fraud and identity theft. Yet there is still no consensus on who is responsible for addressing these threats.                           

TOPICS:
Crooks with stolen usernames and passwords have broken into customer accounts at United and American Airlines and gotten away with booking free trips or upgrades.

Thieves Hijack Miles from American and United Airlines Accounts

January 16, 2015 11:07 am | by Lisa Vaas | Comments

Crooks with stolen usernames and passwords have broken into customer accounts at United and American Airlines and gotten away with booking free trips or upgrades.                         

TOPICS:
Advertisement
Assessing DHS performance 12 years after its creation, a new Federal report called "A Review of the Department of Homeland Security's Missions and Performance" contains a blistering summary on the state of DHS cybersecurity practices and programs.

New Report: DHS, a Mess of Cybersecurity Incompetence

January 15, 2015 12:09 pm | by Violet Blue | Comments

Assessing DHS performance 12 years after its creation, a new Federal report called "A Review of the Department of Homeland Security's Missions and Performance" contains a blistering summary on the state of DHS cybersecurity practices and programs.

TOPICS:
Some 96 percent of organizations across 20 different vertical industries suffered some form of cyber attack in the first half of last year.

New Data Illustrates Reality Of Widespread Cyber Attacks

January 14, 2015 11:49 am | by Kelly Jackson Higgins | Comments

Some 96 percent of organizations across 20 different vertical industries suffered some form of cyber attack in the first half of last year.                                

TOPICS:
The newly-discovered "Skeleton Key" malware is able to circumvent authentication on Active Directory systems, according to Dell researchers.

'Skeleton Key' Malware Unlocks Corporate Networks

January 13, 2015 1:17 pm | by Charlie Osborne | Comments

The newly-discovered "Skeleton Key" malware is able to circumvent authentication on Active Directory systems, according to Dell researchers.                               

TOPICS:
The online attack service launched late last year by the same criminals who knocked Sony and Microsoft’s gaming networks offline over the holidays is powered mostly by thousands of hacked home Internet routers, KrebsOnSecurity.com has discovered.

Lizard Stresser Runs on Hacked Home Routers

January 12, 2015 11:09 am | by Editor | Comments

The online attack service launched late last year by the same criminals who knocked Sony and Microsoft’s gaming networks offline over the holidays is powered mostly by thousands of hacked home Internet routers, KrebsOnSecurity.com has discovered.

TOPICS:
I sometimes get questions about showing attachments in Apple iDevice messaging databases. The questions, however, seem to come at a time when I don’t have any databases on hand to study the issue. Well, this week I stumbled on the chats.db during an exam

Getting Attached: Apple Messaging Attachments

January 8, 2015 12:00 pm | by Editor | Comments

I sometimes get questions about showing attachments in Apple iDevice messaging databases. The questions, however, seem to come at a time when I don’t have any databases on hand to study the issue. Well, this week I stumbled on the chats.db during an exam of a MacBook Air.

TOPICS:
Advertisement
I recently analyzed a malicious document, by opening it on a virtual machine; this was intended to simulate a user opening the document, and the purpose was to determine and document artifacts associated with the system being infected.

What It Looks Like: Disassembling a Malicious Document

January 6, 2015 8:59 am | by Harlan Carvey | Comments

I recently analyzed a malicious document, by opening it on a virtual machine; this was intended to simulate a user opening the document, and the purpose was to determine and document artifacts associated with the system being infected.    

TOPICS:
Whether it’s a suspected forgery, a threatening letter or a questionable signature, investigators are always looking for the most effective methods of linking a questioned document to its author.

Raman Spectroscopy & Ink Analysis

January 5, 2015 9:47 am | by Editor | Comments

Whether it’s a suspected forgery, a threatening letter or a questionable signature, investigators are always looking for the most effective methods of linking a questioned document to its author.               

TOPICS:
Change is one of the only constants in incident response. In time most things will change; technology, tools, processes, and techniques all eventually change. The change is not only limited to the things we rely on to be the last line of defense for our o

Triaging a System Infected with Poweliks

January 5, 2015 9:19 am | by Corey Harrell | Comments

Change is one of the only constants in incident response. In time most things will change; technology, tools, processes, and techniques all eventually change. The change is not only limited to the things we rely on to be the last line of defense for our organizations and/or customers.

TOPICS:

Police Suspect Mt. Gox Bitcoin Theft was an Inside Job

January 2, 2015 9:45 am | by Charlie Osborne | Comments

Japanese police believe that the majority of bitcoins stolen from Mt. Gox was due to insider tampering, a new report claims.                                   

TOPICS:

Can malware and hackers really cause giant physical disasters?

December 30, 2014 9:29 am | by Paul Ducklin | Comments

Right back to the 1980s, when computer viruses first appeared in any number, people have been asking, "Can malware and hackers cause giant physical disasters?"                         

TOPICS:

Invasive Phone Tracking: New SS7 Research Blows the Lid Off Mobile Security

December 30, 2014 9:17 am | by Violet Blue | Comments

The world's oldest — and Europe's largest — hacker organization The Chaos Computer Club is proving its mettle with the talks at this year's 31c3: A New Dawn.                           

TOPICS:

Who's in the Lizard Squad?

December 29, 2014 9:02 am | by Editor | Comments

The core members of a group calling itself “Lizard Squad” — which took responsibility for attacking Sony’s Playstation and Microsoft‘s Xbox networks and knocking them offline for Christmas Day — want very much to be recognized for their actions. So, here’s a closer look at two young men who appear to be anxious to let the world know they are closely connected to the attacks.

TOPICS:

Pages

Advertisement
X
You may login with either your assigned username or your e-mail address.
The password field is case sensitive.
Loading