Advertisement
 
Blogs
Subscribe to Forensic Magazine

The Lead

If you work IR, you know how frustrating the whole process can be, especially when a customer wants to fly the "mission accomplished" banner prematurely. Of course I understand the desire to bring it all to and end. The long hours start to wear on people.

IR is More Than IOCs - It's About Inventory Too

September 29, 2015 | by Jake Williams | Comments

If you work IR, you know how frustrating the whole process can be, especially when a customer wants to fly the "mission accomplished" banner prematurely. Of course I understand the desire to bring it all to and end. The long hours start to wear on people. Questions of cost start to come in. "How much more time will this take?"

TOPICS:

Forensic Workstations: Making the World Less Safe for Criminals

November 25, 2015 10:51 am | by John Samborsk | Comments

Nearly all forensic investigations today involve digital evidence. But with current forensic workstations, what used to take days to download can now be accomplished in a matter of hours.

TOPICS:
At 3 p.m. on Wednesday, the State of Oklahoma plans to execute Richard Glossip in the face of mounting evidence that he is innocent, as he has argued all along.

Countdown to an Execution in Oklahoma

September 16, 2015 12:11 pm | by The Editorial Board | Comments

At 3 p.m. on Wednesday, the State of Oklahoma plans to execute Richard Glossip in the face of mounting evidence that he is innocent, as he has argued all along.  

TOPICS:
The FBI has a rather interesting opinion on how users should approach IoT devices and their security. The takeaway? If you want to use it, you'd better know what you're doing - and keep it off the Internet.

FBI: Deal With Your Own Internet-of-Things Security

September 15, 2015 10:05 am | by Charlie Osborne | Comments

The FBI has a rather interesting opinion on how users should approach IoT devices and their security. The takeaway? If you want to use it, you'd better know what you're doing - and keep it off the Internet.

TOPICS:
Advertisement

A Scout's Guide to Incident Response

September 14, 2015 11:51 am | by Nick Mazitelli | Comments

Driven by a rapidly developing threat landscape, effective incident response is now a mainstay of rigorous cyber security programs - although it remains an area that even many seasoned information security specialists struggle to come to grips with.

TOPICS:
The law enforcement community has been warning technology companies that encryption in their products could let criminals and terrorists off the hook, with little evidence to support that claim. It turns out those warnings have some merit.

Apple iMessage's End-to-End Encryption Stymies US Data Request

September 10, 2015 8:47 am | by John Zorabedian | Comments

The law enforcement community has been warning technology companies that encryption in their products could let criminals and terrorists off the hook, with little evidence to support that claim. It turns out those warnings have some merit.

TOPICS:
Ethnic hair products can change the susceptibility of hair to external drug contamination but race or hair color are not to blame.

Ethnic Hair Products Skew Drug Tests

September 10, 2015 8:36 am | by Steve Down | Comments

Ethnic hair products can change the susceptibility of hair to external drug contamination but race or hair color are not to blame.

TOPICS:
At one time, most organizations didn’t really worry about post-breach litigation; they focused almost exclusively on the technical aspects of the incident response. Most people thought of breached organizations as victims of a crime, not someone to sue fo

Incident Response Legal Considerations

September 4, 2015 8:13 am | by Chris Pogue | Comments

At one time, most organizations didn’t really worry about post-breach litigation; they focused almost exclusively on the technical aspects of the incident response. Most people thought of breached organizations as victims of a crime, not someone to sue for getting hacked.

TOPICS:
More and more cybercrime surveys are mislabeled as studies, security company PR gets reported as news, reliable stats on cybercrime are elusive, and it's almost impossible to tell realistic threats from headline trends.

'Sanity Check' Your Cybercrime Statistics

September 3, 2015 9:35 am | by Violet Blue | Comments

More and more cybercrime surveys are mislabeled as studies, security company PR gets reported as news, reliable stats on cybercrime are elusive, and it's almost impossible to tell realistic threats from headline trends.

TOPICS:
Advertisement
Intransigent sort-of hacker collective Lizard Squad is back. Apparently. Sky News reports that it was unable to access the NCA site for a while, and quoted the NCA as saying that its site was an "attractive target" and that "attacks on it are a fact of li

National Crime Agency Website DDoSed by Lizard Squad

September 1, 2015 12:45 pm | by Paul Ducklin | Comments

Intransigent sort-of hacker collective Lizard Squad is back. Apparently. Sky News reports that it was unable to access the NCA site for a while, and quoted the NCA as saying that its site was an "attractive target" and that "attacks on it are a fact of life."

TOPICS:
Who should Ashley Madison blame for the theft of its information, former CEO Noel Biderman or Thadeus Zu?

Who to Blame, Ashley Madison?

August 28, 2015 1:15 pm | by Ernie Austin, Associate Editor | Comments

Who should Ashley Madison blame for the theft of it's information, former CEO Noel Biderman or Thadeus Zu?

TOPICS:
There is a lot to be said about understanding the scope of an incident - including how quickly you can understand the scope - and how that ultimately impacts containment. If you ask any tried and true incident responders, you’ll generally get two differen

Focus On Incident Response Fundamentals: Containment

August 28, 2015 11:54 am | by Sean Mason | Comments

There is a lot to be said about understanding the scope of an incident - including how quickly you can understand the scope - and how that ultimately impacts containment. If you ask any tried and true incident responders, you’ll generally get two different answers based on their experience and environment.

TOPICS:
In-flight security made quite a lot of headlines earlier this summer, but this time at unusual angle. Aviation has always been focused on safety and had remained the most secure industry that ever existed. However, the buzz was about another aspect of sec

Hacking an Aircraft: Is It Already Real?

August 27, 2015 8:17 am | by Ilja Shatilin | Comments

In-flight security made quite a lot of headlines earlier this summer, but this time at unusual angle. Aviation has always been focused on safety and had remained the most secure industry that ever existed. However, the buzz was about another aspect of security — the one quite surprising for an average passenger and quite expected for an IT specialist.

TOPICS:
Last week, we saw the group behind a significant amount of Angler exploit kit (EK) switch to Neutrino EK. We didn't know if the change was permanent, and I also noted that criminal groups using EKs have quickly changed tactics in the past. This week, the

Actor That Tried Neutrino Exploit Kit Now Back to Angler

August 26, 2015 12:27 pm | by Brad Duncan | Comments

Last week, we saw the group behind a significant amount of Angler exploit kit (EK) switch to Neutrino EK. We didn't know if the change was permanent, and I also noted that criminal groups using EKs have quickly changed tactics in the past. This week, the group is back to Angler EK.

TOPICS:
Hacked online cheating service AshleyMadison.com is portraying itself as a victim of malicious cyber criminals, but leaked emails from the company’s CEO suggests that AshleyMadison’s top leadership hacked into a competing dating service in 2012.

Leaked AshleyMadison Emails Suggest Execs Hacked Competitors

August 25, 2015 10:08 am | by Brian Krebs | Comments

Hacked online cheating service AshleyMadison.com is portraying itself as a victim of malicious cyber criminals, but leaked emails from the company’s CEO suggests that AshleyMadison’s top leadership hacked into a competing dating service in 2012.

TOPICS:
It appears the origial intention of the Ashely Madison hackers was to expose what they   see as fraud perpetrated on the users of the Ashley Madison website -- not a moral   crusade.  But they might just end up making a lot of money for class-action lawye

Ashley Madison Hackers Making Money for Lawyers

August 24, 2015 12:11 pm | by Ernie Austin, Associate Editor | Comments

It appears the original intention of the Ashley Madison hackers was to expose what they see as fraud perpetrated on the users of the Ashley Madison website - not a moral crusade. But they might just end up making a lot of money for class-action lawyers.

TOPICS:

Pages

Advertisement
X
You may login with either your assigned username or your e-mail address.
The password field is case sensitive.
Loading