Advertisement
 
News
Subscribe to Forensic Magazine
View Sample

SUBSCRIBE TO FREE
Forensic Magazine
EMAIL NEWSLETTER

Russian Hackers used a phishing email sent to the State Department as a jumping off point to infiltrate White House systems. Non-classified, but sensitive, data was taken. The hackers have also been able to reenter the State Department's system, despite e

Russians Still Hacking the White House

April 9, 2015 11:25 am | by Ernie Austin, Associate Editor | Comments

Russian Hackers used a phishing email sent to the State Department as a jumping off point to infiltrate White House systems. Non-classified, but sensitive, data was taken. The hackers have also been able to reenter the State Department's system, despite efforts to keep them out.

TOPICS:
Last December, Police in Massachusetts confronted a new, and growing, frontier in cyber terrorism when the CryptoLocker ransomware virus infected the department’s network, encrypting essential department files until the town paid a $500 bitcoin ransom.

Police Pay Ransom After Network Cyber Attack

April 9, 2015 11:02 am | by Jayne W. Miller. Tewksbury Town Crier | Comments

Last December, Police in Massachusetts confronted a new, and growing, frontier in cyber terrorism when the CryptoLocker ransomware virus infected the department’s network, encrypting essential department files until the town paid a $500 bitcoin ransom.

TOPICS:
A new group of international cybercrime fighters claimed one of its first kills Thursday, pulling the plug on malicious servers that hijacked at least 12,000 machines, most of them in the United States.

Cybercrime Fighting Group Takes Down Beebone Botnet

April 9, 2015 10:44 am | by Raphael Satter, Associated Press | Comments

A new group of international cybercrime fighters claimed one of its first kills Thursday, pulling the plug on malicious servers that hijacked at least 12,000 machines, most of them in the United States.

TOPICS:
Advertisement
Malware-as-a-service trend has effectively democratized the means for hackers of all skill levels to launch damaging attacks, with cyber criminals blending cutting edge tools with tried-and-tested techniques.

Attackers Blend New With Old to Foil Corporate Defenses

April 9, 2015 10:28 am | by Phil Muncaster, Infosecurity Magazine | Comments

Malware-as-a-service trend has effectively democratized the means for hackers of all skill levels to launch damaging attacks, with cyber criminals blending cutting edge tools with tried-and-tested techniques.

TOPICS:
Ransomware is one of the fastest-growing forms of hacking, cybersecurity experts say. Anyone from a home computer user to a Fortune 500 company can be infected. It can also attack smartphones. The smaller the users, the more vulnerable they are to losing

Computer Users Face Ransomware's Choice

April 9, 2015 8:40 am | by Joyce M. Rosenberg, Associated Press | Comments

Ransomware is one of the fastest-growing forms of hacking, cybersecurity experts say. Anyone from a home computer user to a Fortune 500 company can be infected. It can also attack smartphones. The smaller the users, the more vulnerable they are to losing their files — unless they have a secure backup for their system or go through the complicated process of paying cyber criminals.

TOPICS:
Dzhokhar Tsarnaev was convicted Wednesday in the Boston Marathon bombing by a federal jury that now must decide whether the 21-year-old former college student should be executed. His conviction was practically a foregone conclusion, given his lawyer's sta

Dzhokhar Tsarnaev Convicted in Boston Marathon Bombing

April 8, 2015 2:44 pm | by Denise LaVoie, Associated Press | Comments

Dzhokhar Tsarnaev was convicted Wednesday in the Boston Marathon bombing by a federal jury that now must decide whether the 21-year-old former college student should be executed. His conviction was practically a foregone conclusion, given his lawyer's startling admission during opening statements that Tsarnaev carried out the attack with his now-dead older brother, Tamerlan.

TOPICS:
London police say heavy cutting equipment has been used to break into a vault containing safety deposit boxes in the Hatton Garden jewelry district.

UK Police Report Robbery of Safety Boxes in Jewelry District

April 8, 2015 12:34 pm | by The Associated Press | Comments

London police say heavy cutting equipment has been used to break into a vault containing safety deposit boxes in the Hatton Garden jewelry district.

TOPICS:
RSA, The Security Division of EMC, has released the results of a new global breach readiness survey that covered thirty countries and compared those global results with a survey of the Security for Business Innovation Council (SBIC), a group of top securi

Most Organizations Not Prepared to Respond to a Breach

April 8, 2015 11:33 am | by EMC | Comments

RSA, The Security Division of EMC, has released the results of a new global breach readiness survey that covered thirty countries and compared those global results with a survey of the Security for Business Innovation Council (SBIC), a group of top security leaders from the Global 1000.

TOPICS:
Advertisement
When a data breach occurs and personal information is stolen, where does it end up? Bitglass researchers decided to find out.

Diving Into the Dark Web: Where does stolen data go?

April 8, 2015 11:02 am | by Charlie Osborne, ZD Net | Comments

When a data breach occurs and personal information is stolen, where does it end up? Bitglass researchers decided to find out.

TOPICS:
Digital currencies are an increasingly important aspect of e-commerce and other transactional arenas. But be aware: Bitcoin, and other cryptocurrencies based on blockchain technology, have a few flaws that could open them up for abuse by enterprising hack

Bitcoin Flaws Beckon Hackers

April 8, 2015 10:49 am | by Tara Seals, Infosecurity Magazine | Comments

Digital currencies are an increasingly important aspect of e-commerce and other transactional arenas. But be aware: Bitcoin, and other cryptocurrencies based on blockchain technology, have a few flaws that could open them up for abuse by enterprising hackers.

TOPICS:
Deloitte Cyber Risk Service stages executive war games to show what might happen in the C-Suite after a breach.

Cyber War Games: Top 3 Lessons Learned about Incident Response

April 8, 2015 10:31 am | by Sara Peters, Dark Reading | Comments

Deloitte Cyber Risk Service stages executive war games to show what might happen in the C-Suite after a breach.

TOPICS:
The FBI is advising people responsible for WordPress websites to be on the lookout for attacks carried out by individuals sympathetic to the Islamic State of Iraq and al-Shams terrorist group, which is also known as the Islamic State in the Levant.

Pro-ISIS Script Kiddies Exploiting WordPress Sites, FBI Warns

April 8, 2015 10:10 am | by Dan Goodin, Ars Technica | Comments

The FBI is advising people responsible for WordPress websites to be on the lookout for attacks carried out by individuals sympathetic to the Islamic State of Iraq and al-Shams terrorist group, which is also known as the Islamic State in the Levant.

TOPICS:
DNA profiling (or genetic fingerprinting) has proved a revolutionary tool for forensic investigators as a means to identify potential suspects, exonerate the innocent and convict the guilty. But, like any forensic technique, it has its limitations. One li

Pointing the Finger at the Right Identical Twin Just Got Easier

April 8, 2015 9:21 am | by Graham Williams, The Convesation | Comments

DNA profiling (or genetic fingerprinting) has proved a revolutionary tool for forensic investigators as a means to identify potential suspects, exonerate the innocent and convict the guilty. But, like any forensic technique, it has its limitations. One limitation is in cases involving identical twins, something that has raised technical, legal and ethical problems – until now.  

TOPICS:
The list of active cases at the cyber forensics lab at Armstrong State University’s police department is more representative of surrounding Savannah than the sleepy campus. That’s because other law enforcement agencies — from local police to the FBI — tak

Local, Federal Police Turn to University for Cyber Forensics Help

April 7, 2015 3:56 pm | by Dash Coleman, Savannah Morning News | Comments

The list of active cases at the cyber forensics lab at Armstrong State University’s police department is more representative of surrounding Savannah than the sleepy campus. That’s because other law enforcement agencies — from local police to the FBI — take advantage of something Armstrong’s officers have in abundance: time and cyber crime expertise.

TOPICS:
In many U.S. police departments, ballistic evidence might be shelved in an overworked crime lab, where analysts would only run it through the database to prepare a case for trial. But authorities in Denver are leading a national trend to put ballistics ev

Police Testing Spent Shell Casings Faster to Solve Gun Crime

April 7, 2015 3:44 pm | by Sadie Gurman, Associated Press | Comments

In many U.S. police departments, ballistic evidence might be shelved in an overworked crime lab, where analysts would only run it through the database to prepare a case for trial. But authorities in Denver are leading a national trend to put ballistics evidence into the hands of investigators much more quickly — before leads dry up and suspects disappear.

TOPICS:

Pages

Advertisement
X
You may login with either your assigned username or your e-mail address.
The password field is case sensitive.
Loading