It's been a long journey from Van Halen's "Hot for Teacher," released in 1984, to the recent Saturday Night Live skit about a teacher on trial for raping one of her male high school students.
Entomology, that is the study of insects, can provide vital information during a forensic...
Forensic biology has made tremendous strides in the past few decades thanks largely to advances...
Chris Roberts knows a lot about hacking planes. But not because he's trying to make them fall out of the sky. In fact, his job as a security researcher is to figure out how bad guys could hack computer systems so that companies can fix them.
Mini, micro, and even nano-timelines can assist an analyst in answering questions and addressing analysis goals in an extremely timely and accurate manner.
Attribution ... does it matter? If you're gov, yeah (maybe). If you're a mom-and-pop, not so much. I would suggest that during both hunting and IR, attribution can be a distraction. Why is that?
New annual Verizon Data Breach Investigations Report shows most attacks affect a secondary victim, the average cost of a data breach is just 58 cents per stolen record -- and attackers are not going after mobile en masse.
The big search engines don't ignore the Deep Web because there's some impenetrable technical barrier that prevents them from indexing it - they do it because they're commercial entities and the costs and benefits of searching beyond their current horizons don't stack up.
Companies are finding a way to minimize the repercussions when their digital security is violated. Unfortunately, they're turning to the same safeguards that protect the guitar-strumming hands of Keith Richards, the goal-scoring limbs of David Beckham and the most remarkable assets of Dolly Parton, rather than coming clean about the perils of data breaches or pooling information so that threats can be properly quantified and addressed.
Fourteen-year-old Domanik Green has been charged with felony offense against a computer system and unauthorized access. The eighth grader changed the wallpaper on a teacher's computer to a picture of two men kissing, after using an administrative-level password to accesss his middle school's network.
Most organizations today focus on protecting their networks against malware, exploits, malicious websites and unpatched vulnerabilities. Unfortunately, there is a fundamental flaw with this approach: a malware-centric defense approach will leave you vulnerable to attacks that don’t leverage malware.
China has been actively diverting unencrypted Web traffic destined for its top online search service — Baidu.com — so that some visitors from outside of the country were unwittingly enlisted in a novel and unsettling series of denial-of-service attacks aimed at sidelining sites that distribute anti-censorship tools, according to research released this week.
One of the goals of IR engagements is to locate the initial infection vector and/or patient zero. In order to determine this, timeline analysis becomes critical, as does determining when the malware was created and/or executed on a system.
Google's Android security report shows that devices that only install apps from the Google Play store have fewer infections.
Without breach notification requirements in place, it can be hard to gauge the popularity of law firms as targets for cyber criminals. But if recent findings are any indication, the legal industry may well be the next lowest hanging fruit for attackers.
If you're an organization that's been stung by ransomware before, you're more likely to pay up again, and you probably won't tell a soul, according to a study released today by ThreatTrack.
Researchers have revealed a cyberspying attack campaign that's been underway since 2012, mainly against Israeli and other Middle Eastern targets in Lebanon and Turkey, but also in the US, Canada, Japan, Peru, and the UK and other countries.
The Defense Advanced Research Projects Agency (DARPA) is looking for a superhero who can take on one of the trickiest problems in computer security. Humans applicants need not apply.