Advertisement
 
News
Subscribe to Forensic Magazine

The Lead

An APT campaign has been detected that exploits zero-day vulnerabilities in Adobe Flash and Microsoft Windows. Adobe patched vulnerability CVE-2015-3043 previously, but the Windows vulnerability is new. Security firm FireEye says that the group resonsible

Two Vulnerabilities Exploited by Russian Hackers

April 20, 2015 | by Ernie Austin, Associate Editor | Comments

An APT campaign has been detected that exploits zero-day vulnerabilities in Adobe Flash and Microsoft Windows. Adobe patched vulnerability CVE-2015-3043 previously, but the Windows vulnerability is new. Security firm FireEye says that the group responsible for the attack is APT28. 

TOPICS:
View Sample

SUBSCRIBE TO FREE
Forensic Magazine
EMAIL NEWSLETTER

At a time when the Pentagon arguably is losing a battle with industry for top tech talent, the Army is offering companies the resumes of its best cyber warriors.

The Army is Sharing Its Top Cyber Warriors With Hollywood and Wall Street

April 21, 2015 8:17 am | by Aliya Sternstein, Defense One | Comments

At a time when the Pentagon arguably is losing a battle with industry for top tech talent, the Army is offering companies the resumes of its best cyber warriors.

TOPICS:
Hackers have managed to penetrate computer networks associated with the Israeli military in an espionage campaign that skillfully packages existing attack software with trick emails, according to security researchers at Blue Coat Systems Inc.

Israeli Military Networks Breached by Hackers

April 20, 2015 1:45 pm | by Joseph Menn, Reuters | Comments

Hackers have managed to penetrate computer networks associated with the Israeli military in an espionage campaign that skillfully packages existing attack software with trick emails, according to security researchers at Blue Coat Systems Inc.

TOPICS:
Cyber crime has become as big a threat to Europe's security as terrorism, the head of the continent's policing agency has warned.

Cyber Crime Now 'Number One' Threat: Europol Chief

April 20, 2015 1:20 pm | by AFP | Comments

Cyber crime has become as big a threat to Europe's security as terrorism, the head of the continent's policing agency has warned.

TOPICS:
Advertisement

Milwaukee Group to Help Research Massacre of Jews in Poland

April 20, 2015 12:15 pm | by Annysa Johnson, The Journal Sentinel | Comments

A lesser known piece of that macabre history is the estimated 2 million or more who died, often slowly and agonizingly, one bullet at a time, at the hands of the Einsatzgruppen, the Ordnungspolizei and others.

TOPICS:
The next generation of cyber attacks will be more sophisticated, more difficult to detect and more capable of wreaking untold damage on the nation’s computer systems.

Algorithmic Cyber Attacks are Coming

April 20, 2015 8:39 am | by University of Utah | Comments

The next generation of cyber attacks will be more sophisticated, more difficult to detect and more capable of wreaking untold damage on the nation’s computer systems.  

TOPICS:
Breaking from decades of "Just Say No"-type messaging about marijuana use, Colorado law enforcement officials are starting a new campaign designed to promote safe marijuana use.

Colorado Law Enforcement Switches Message to Safe Pot Use

April 17, 2015 3:14 pm | by Kristen Wyatt, Associated Press | Comments

Breaking from decades of "Just Say No"-type messaging about marijuana use, Colorado law enforcement officials are starting a new campaign designed to promote safe marijuana use.

TOPICS:
The forensic science research and development (R&D) conducted decades ago is having an impact in crime laboratories today. In crime labs across the U.S., scientists are being armed with increasingly sophisticated technologies to help bring criminals to ju

Impact of Forensic Science Research & Development

April 17, 2015 2:35 pm | by NIJ | Comments

The forensic science research and development (R&D) conducted decades ago is having an impact in crime laboratories today. In crime labs across the U.S., scientists are being armed with increasingly sophisticated technologies to help bring criminals to justice and protect the innocent.

TOPICS:
IBM is making a move to open up more than two decades worth of cyber-threat intelligence via a new data-sharing exchange that is modeled off of social networking.

IBM Launches Open Threat Intelligence Platform

April 17, 2015 1:04 pm | by Tara Seals, Infosecurity Magazine | Comments

IBM is making a move to open up more than two decades worth of cyber-threat intelligence via a new data-sharing exchange that is modeled off of social networking.

TOPICS:
Advertisement
Cellebrite provided its Universal Forensic Extraction Device (UFED) units to the INTERPOL Digital Crime Centre (IDCC), to assist in retrieving evidence for the prosecution of suspects involved in a global online ‘sextortion’ scam.

Mobile Forensic Tool Accesses Key Evidence for Global 'Sextortion' Case

April 17, 2015 12:52 pm | by Cellebrite | Comments

Cellebrite provided its Universal Forensic Extraction Device (UFED) units to the INTERPOL Digital Crime Centre (IDCC), to assist in retrieving evidence for the prosecution of suspects involved in a global online ‘sextortion’ scam.

TOPICS:
Like a corporation that doesn't like government intrusion, the Iranian government   seems to to be turning from aggression within regulated industry to a new warfare   technology that has fewer restrictions.

Iran Turning to Unregulated Cyber Attacks

April 17, 2015 12:30 pm | by Ernie Austin, Associate Editor | Comments

Like a corporation that doesn't like government intrusion, the Iranian government seems to to be turning from aggression within regulated industry to a new warfare technology that has fewer restrictions.

TOPICS:
Hackers have for years bought and sold their secrets in a de facto gray market for zero-day exploits—intrusion techniques for which no software patch exists. Now a new marketplace hopes to formalize that digital arms trade in a setting where it could flou

New Dark-Web Market is Selling Zero-Day Exploits to Hackers

April 17, 2015 12:04 pm | by Andy Greenberg, Wired | Comments

Hackers have for years bought and sold their secrets in a de facto gray market for zero-day exploits—intrusion techniques for which no software patch exists. Now a new marketplace hopes to formalize that digital arms trade in a setting where it could flourish: under the cover of the Dark Web’s anonymity protections.

TOPICS:
The US government released a report yesterday warning of security threats facing modern aircraft, leading to stories from major publications claiming in-flght Wi-Fi could be hacked to take control of a passenger plane. But according a qualified pilot and

Pilot: US Government Claims Of Plane Wi-Fi Hacking Wrong And Irresponsible

April 17, 2015 8:46 am | Comments

The US government released a report yesterday warning of security threats facing modern aircraft, leading to stories from major publications claiming in-flght Wi-Fi could be hacked to take control of a passenger plane. But according a qualified pilot and professor of digital forensics, the report contained much erroneous information.

TOPICS:
Like something out of CSI or Bones, researchers at Arizona State University are working to solve the mysteries of unidentified human remains — and just as on those TV shows, science plays a key role.

Isotopes Unlock Clues in Unidentified Human Remains

April 16, 2015 2:59 pm | by Arizona State university | Comments

Like something out of CSI or Bones, researchers at Arizona State University are working to solve the mysteries of unidentified human remains — and just as on those TV shows, science plays a key role.

TOPICS:
Twenty nuclear forensics students and faculty from Prairie View A&M University visited the Texas A&M University campus as part of the Nuclear Forensics for Minority Serving Institutions program sponsored by the U.S. Department of Homeland Security’s Domes

Prairie View A&M Students Visit Texas A&M as Part of DHS Nuclear Forensics Program

April 16, 2015 2:40 pm | by Kelley Ragusa, Texas A&M University | Comments

Twenty nuclear forensics students and faculty from Prairie View A&M University visited the Texas A&M University campus as part of the Nuclear Forensics for Minority Serving Institutions program sponsored by the U.S. Department of Homeland Security’s Domestic Nuclear Detection Office.

TOPICS:
The Drug Enforcement Administration (DEA) and the United States Army have almost certainly been buying questionable remote access hacking tools for years from an Italian company called Hacking Team, via an obscure American reseller called Cicom USA.

DEA, US Army Has Been Buying Hacking Tools

April 16, 2015 1:03 pm | by Cyrus Farivar, Ars Technica | Comments

The Drug Enforcement Administration (DEA) and the United States Army have almost certainly been buying questionable remote access hacking tools for years from an Italian company called Hacking Team, via an obscure American reseller called Cicom USA.

TOPICS:

Pages

Advertisement
X
You may login with either your assigned username or your e-mail address.
The password field is case sensitive.
Loading