Advertisement
 
Blogs
Subscribe to Forensic Magazine

The Lead

It's been a long journey from Van Halen's "Hot for Teacher," released in 1984, to the recent Saturday Night Live skit about a teacher on trial for raping one of her male high school students.

Female Teachers Use Social Media to Lure Young Male Victims

April 21, 2015 | by Ernie Austin, Associate Editor | Comments

It's been a long journey from Van Halen's "Hot for Teacher," released in 1984, to the recent Saturday Night Live skit about a teacher on trial for raping one of her male high school students.

TOPICS:
View Sample

SUBSCRIBE TO FREE
Forensic Magazine
EMAIL NEWSLETTER

Chris Roberts knows a lot about hacking planes. But not because he's trying to make them fall out of the sky. In fact, his job as a security researcher is to figure out how bad guys could hack computer systems so that companies can fix them.

Just how hackable is your plane?

April 22, 2015 11:56 am | by Andrea Peterson | Comments

Chris Roberts knows a lot about hacking planes. But not because he's trying to make them fall out of the sky. In fact, his job as a security researcher is to figure out how bad guys could hack computer systems so that companies can fix them.

TOPICS:
Mini, micro, and even nano-timelines can assist an analyst in answering questions and addressing analysis goals in an extremely timely and accurate manner.

Micro- & Mini-Timelines

April 20, 2015 10:02 am | by Harlan Carvey | Comments

Mini, micro, and even nano-timelines can assist an analyst in answering questions and addressing analysis goals in an extremely timely and accurate manner.

TOPICS:
Attribution ... does it matter? If you're gov, yeah (maybe). If you're a mom-and-pop, not so much. I would suggest that during both hunting and IR, attribution can be a distraction. Why is that?

Detection Hunting Talk Notes

April 16, 2015 10:07 am | by Harlan Carvey | Comments

Attribution ... does it matter? If you're gov, yeah (maybe). If you're a mom-and-pop, not so much. I would suggest that during both hunting and IR, attribution can be a distraction. Why is that? 

TOPICS:
Advertisement
New annual Verizon Data Breach Investigations Report shows most attacks affect a secondary victim, the average cost of a data breach is just 58 cents per stolen record -- and attackers are not going after mobile en masse.

Mobile Devices Not a Factor in Real-World Attacks

April 15, 2015 10:19 am | by Kelly Jackson Higgins | Comments

New annual Verizon Data Breach Investigations Report shows most attacks affect a secondary victim, the average cost of a data breach is just 58 cents per stolen record -- and attackers are not going after mobile en masse.

TOPICS:
The big search engines don't ignore the Deep Web because there's some impenetrable technical barrier that prevents them from indexing it - they do it because they're commercial entities and the costs and benefits of searching beyond their current horizons

Is DARPA's Memex search engine a Google-killer?

April 15, 2015 9:43 am | by Mark Stockley | Comments

The big search engines don't ignore the Deep Web because there's some impenetrable technical barrier that prevents them from indexing it - they do it because they're commercial entities and the costs and benefits of searching beyond their current horizons don't stack up.

TOPICS:
Companies are finding a way to minimize the repercussions when their digital security is violated. Unfortunately, they're turning to the same safeguards that protect the guitar-strumming hands of Keith Richards, the goal-scoring limbs of David Beckham and

Insurance Won't Solve Cybercrime

April 14, 2015 10:19 am | by Mark Gilbert | Comments

Companies are finding a way to minimize the repercussions when their digital security is violated. Unfortunately, they're turning to the same safeguards that protect the guitar-strumming hands of Keith Richards, the goal-scoring limbs of David Beckham and the most remarkable assets of Dolly Parton, rather than coming clean about the perils of data breaches or pooling information so that threats can be properly quantified and addressed.

TOPICS:
Ernie Austin

Middle School Boy Charged With Felony Pranking

April 14, 2015 9:54 am | by Ernie Austin, Associate Editor | Comments

Fourteen-year-old Domanik Green has been charged with felony offense against a computer system and unauthorized access. The eighth grader changed the wallpaper on a teacher's computer to a picture of two men kissing, after using an administrative-level password to accesss his middle school's network.

TOPICS:
Most organizations today focus on protecting their networks against malware, exploits, malicious websites and unpatched vulnerabilities. Unfortunately, there is a fundamental flaw with this approach: a malware-centric defense approach will leave you vulne

Solving the Right Problem: Stop Adversaries, Not Just Their Tools

April 10, 2015 10:11 am | by Dmitri Alperovitch | Comments

Most organizations today focus on protecting their networks against malware, exploits, malicious websites and unpatched vulnerabilities. Unfortunately, there is a fundamental flaw with this approach: a malware-centric defense approach will leave you vulnerable to attacks that don’t leverage malware.  

TOPICS:
Advertisement
China has been actively diverting unencrypted Web traffic destined for its top online search service — Baidu.com — so that some visitors from outside of the country were unwittingly enlisted in a novel and unsettling series of denial-of-service attacks ai

Don't Be Fodder for China's 'Great Cannon'

April 10, 2015 9:52 am | by Brian Krebs | Comments

China has been actively diverting unencrypted Web traffic destined for its top online search service — Baidu.com — so that some visitors from outside of the country were unwittingly enlisted in a novel and unsettling series of denial-of-service attacks aimed at sidelining sites that distribute anti-censorship tools, according to research released this week.

TOPICS:
One of the goals of IR engagements is to locate the initial infection vector and/or patient zero. In order to determine this, timeline analysis becomes critical, as does determining when the  malware was created and/or executed on a system.

USN Journal: Where have you been all my life?

April 7, 2015 10:41 am | by Mari DeGrazia | Comments

One of the goals of IR engagements is to locate the initial infection vector and/or patient zero. In order to determine this, timeline analysis becomes critical, as does determining when the  malware was created and/or executed on a system.

TOPICS:
Google's Android security report shows that devices that only install apps from the Google Play store have fewer infections.

Google: Less Than 1% Of Androids Have Potentially Harmful App Installed

April 6, 2015 10:44 am | by Sara Peters | Comments

Google's Android security report shows that devices that only install apps from the Google Play store have fewer infections.

TOPICS:
Without breach notification requirements in place, it can be hard to gauge the popularity of law firms as targets for cyber criminals. But if recent findings are any indication, the legal industry may well be the next lowest hanging fruit for attackers.

Law Firms: Cyber Criminals’ Next Top Target?

April 2, 2015 9:31 am | by Nate Lord | Comments

Without breach notification requirements in place, it can be hard to gauge the popularity of law firms as targets for cyber criminals. But if recent findings are any indication, the legal industry may well be the next lowest hanging fruit for attackers.

TOPICS:
If you're an organization that's been stung by ransomware before, you're more likely to pay up again, and you probably won't tell a soul, according to a study released today by ThreatTrack.

30% Of Companies Would Pay Ransoms to Cyber Criminals

April 1, 2015 9:34 am | by Sara Peters | Comments

If you're an organization that's been stung by ransomware before, you're more likely to pay up again, and you probably won't tell a soul, according to a study released today by ThreatTrack.

TOPICS:
Researchers have revealed a cyberspying attack campaign that's been underway since 2012, mainly against Israeli and other Middle Eastern targets in Lebanon and Turkey, but also in the US, Canada, Japan, Peru, and the UK and other countries.

Lebanon Believed Behind Newly Uncovered Cyber Espionage Operation

March 31, 2015 10:58 am | by Kelly Jackson Higgins | Comments

Researchers have revealed a cyberspying attack campaign that's been underway since 2012, mainly against Israeli and other Middle Eastern targets in Lebanon and Turkey, but also in the US, Canada, Japan, Peru, and the UK and other countries.

TOPICS:
The Defense Advanced Research Projects Agency (DARPA) is looking for a superhero who can take on one of the trickiest problems in computer security. Humans applicants need not apply.

DARPA's Plan to Make Software Security 'the domain of machines'

March 31, 2015 10:38 am | by Mark Stockley | Comments

The Defense Advanced Research Projects Agency (DARPA) is looking for a superhero who can take on one of the trickiest problems in computer security. Humans applicants need not apply.

TOPICS:

Pages

Advertisement
X
You may login with either your assigned username or your e-mail address.
The password field is case sensitive.
Loading