Advertisement
 
News
Subscribe to Forensic Magazine

The Lead

The Obama administration is developing a package of unprecedented economic sanctions against Chinese companies and individuals who have benefited from their government’s cyber theft of valuable U.S. trade secrets.

US Developing Sanctions Against China Over Cyber Thefts

August 31, 2015 | by Ellen Nakashima, The Washington Post | Comments

The Obama administration is developing a package of unprecedented economic sanctions against Chinese companies and individuals who have benefited from their government’s cyber theft of valuable U.S. trade secrets.

TOPICS:
View Sample

SUBSCRIBE TO FREE
Forensic Magazine
EMAIL NEWSLETTER

Researchers have linked a sophisticated hacking scheme targeting Iranian dissidents and at least one freedom of expression activist back to Iran.

Report Links Hacking Scheme to Iran

August 28, 2015 1:42 pm | by Bree Fowler, Associated Press | Comments

Researchers have linked a sophisticated hacking scheme targeting Iranian dissidents and at least one freedom of expression activist back to Iran.

TOPICS:
When cyber crime pops up in the news, it’s often accompanied by footage of dramatic raids, or grand press conferences held by law enforcement. This time, however, the National Crime Agency (NCA) — which is essentially the UK's version of the FBI — has tak

Six Lizard Squad Suspects Arrested, 50 More Given a Lecture

August 28, 2015 11:28 am | by Joseph Cox, Motherboard | Comments

When cyber crime pops up in the news, it’s often accompanied by footage of dramatic raids, or grand press conferences held by law enforcement. This time, however, the National Crime Agency (NCA) — which is essentially the UK's version of the FBI — has taken a different approach.

TOPICS:
A former intern at security firm FireEye has admitted in federal court that he designed a malicious software tool that allowed attackers to take control of other Android phones so they could spy on their owners.

Former Security Intern Admits Developing Super-Stealthy Android Spyware

August 28, 2015 10:57 am | by Dan Goodin, Ars Technica | Comments

A former intern at security firm FireEye has admitted in federal court that he designed a malicious software tool that allowed attackers to take control of other Android phones so they could spy on their owners.

TOPICS:
Advertisement
Accusing the Justice Department of stonewalling, media company Associated Press filed a suit Thursday against the FBI for failing to turn over information under the Freedom of Information Act about a criminal sting operation in which it created a bogus ne

Associated Press Sues After FBI Impersonates Journalist in Sting Operation

August 28, 2015 10:35 am | by Mary Ann Toman-Miller, Los Angeles Times | Comments

Accusing the Justice Department of stonewalling, media company Associated Press filed a suit Thursday against the FBI for failing to turn over information under the Freedom of Information Act about a criminal sting operation in which it created a bogus news story and impersonated an AP journalist.

TOPICS:
In mere seconds, a system developed at the Department of Energy’s Oak Ridge National Laboratory can identify and characterize a solid or liquid sample.

Chemical Sampling Interface Features Simplicity, Speed

August 27, 2015 12:16 pm | by Oak Ridge National Laboratory | Comments

In mere seconds, a system developed at the Department of Energy’s Oak Ridge National Laboratory can identify and characterize a solid or liquid sample.

TOPICS:
When hacker group Impact Team released the Ashley Madison data, they asserted that “thousands” of the women’s profiles were fake. Later, this number got blown up in news stories that asserted “90-95%” of them were fake, though nobody put forth any evidenc

Almost None of the Women in the Ashley Madison Database Ever Used the Site

August 27, 2015 11:27 am | by Annalee Newitz, Gizmodo | Comments

When hacker group Impact Team released the Ashley Madison data, they asserted that “thousands” of the women’s profiles were fake. Later, this number got blown up in news stories that asserted “90-95%” of them were fake, though nobody put forth any evidence for such an enormous number. So I downloaded the data and analyzed it to find out how many actual women were using Ashley Madison, and who they were. 

TOPICS:
The Defense Department’s information technology arm has unveiled a guide for IT shops in the defense and military space planning a move to the cloud.

The US Military Gets a Guidebook to the Cloud

August 27, 2015 10:07 am | by Frank Konkel, Defense One | Comments

The Defense Department’s information technology arm has unveiled a guide for IT shops in the defense and military space planning a move to the cloud.  

TOPICS:
Recent high-profile child-porn arrests in Louisville and Indiana momentarily focus a spotlight on a crime that Kentucky police and courts have seen steadily grow — climbing over 10 years from 250 charges to 2,400 last year.

Child Porn Arrests Up in Kentucky as State Police Beefs Up Forces

August 27, 2015 9:45 am | by Matthew Glowicki, The Courier-Journal | Comments

Recent high-profile child-porn arrests in Louisville and Indiana momentarily focus a spotlight on a crime that Kentucky police and courts have seen steadily grow — climbing over 10 years from 250 charges to 2,400 last year.

TOPICS:
Advertisement
The Dark Web's biggest marketplace for drugs seems to have learned a lesson from the downfall of the Silk Road: When cracks start to appear in your anonymity’s armor, it’s time to quit while you’re ahead — or, at least, retreat and regroup.

Agora, the Dark Web's Biggest Drug Market, is Going Offline

August 27, 2015 8:18 am | by Andy Greenberg, Wired | Comments

The Dark Web's biggest marketplace for drugs seems to have learned a lesson from the downfall of the Silk Road: When cracks start to appear in your anonymity’s armor, it’s time to quit while you’re ahead — or, at least, retreat and regroup.

TOPICS:
The National Cybersecurity Center of Excellence is requesting comments on a draft guide to help energy companies better control who has access to their networked resources, including buildings, equipment, information technology and industrial control syst

Draft Guide Can Help Energy Companies Reduce Cyber Risk

August 27, 2015 8:18 am | by NIST | Comments

The National Cybersecurity Center of Excellence is requesting comments on a draft guide to help energy companies better control who has access to their networked resources, including buildings, equipment, information technology and industrial control systems. The center, part of the U.S. Commerce Department’s National Institute of Standards and Technology, works with IT developers and providers to help businesses reduce their cyber risk.

TOPICS:
Ten years ago, psychiatrist Jeffrey Rouse was on a clear path toward academia. He spent most of his days hunkered down in a research lab, staring at MRI images of brains. Then Hurricane Katrina upended his world.

How Katrina Turned a Psychiatrist Into a Coroner

August 26, 2015 2:14 pm | by Katie Bishop and Anna Sale, The Atlantic | Comments

Ten years ago, psychiatrist Jeffrey Rouse was on a clear path toward academia. He spent most of his days hunkered down in a research lab, staring at MRI images of brains. Then Hurricane Katrina upended his world.

TOPICS:
The popular code repository website GitHub was hit by a cyberattack on Tuesday morning, just a few months after it suffered a massive and enduring distributed denial of service attack, which was linked to China.

GitHub Hit By DDoS Attack, Again

August 26, 2015 12:34 pm | by Lorenzo Franceschi-Bicchierai, Motherboard | Comments

The popular code repository website GitHub was hit by a cyber attack on Tuesday morning, just a few months after it suffered a massive and enduring distributed denial of service attack, which was linked to China.

TOPICS:
Eight people across the U.S. who registered to use Ashley Madison are suing the website for cheaters after hackers released personal and detailed information of millions of users, including financial data and sexual proclivities.

Ashley Madison Users in US Sue Cheating Website Over Breach

August 26, 2015 11:43 am | by Amanda Lee Myers, Associated Press | Comments

Eight people across the U.S. who registered to use Ashley Madison are suing the website for cheaters after hackers released personal and detailed information of millions of users, including financial data and sexual proclivities.

TOPICS:
With Tor-based attacks on the rise, IBM says it's time to stop Tor in the enterprise.

IBM Advises Businesses to Block Tor

August 26, 2015 11:26 am | by Kelly Jackson Higgins, Dark Reading | Comments

With Tor-based attacks on the rise, IBM says it's time to stop Tor in the enterprise.

TOPICS:
Security firm Symantec has released a research report containing advice and practical guidance for combatting the increasingly significant issue of automotive security vulnerabilities.

Symantec Publishes Crash Course in Car Security

August 26, 2015 11:14 am | by Mike Hine, Infosecurity Magazine | Comments

Security firm Symantec has released a research report containing advice and practical guidance for combatting the increasingly significant issue of automotive security vulnerabilities.

TOPICS:

Pages

Advertisement
X
You may login with either your assigned username or your e-mail address.
The password field is case sensitive.
Loading