Advertisement
 
News
Subscribe to Forensic Magazine
View Sample

SUBSCRIBE TO FREE
Forensic Magazine
EMAIL NEWSLETTER

The value of cyber threat intelligence increases as it’s shared. That’s the idea behind the X-Force Exchange, a 700-terabyte platform of aggregated cyber threat information IBM has built to foster cybersecurity collaboration.

What 700 TB of Cyber Threat Data Can Do for You

May 11, 2015 8:44 am | Comments

The value of cyber threat intelligence increases as it’s shared. That’s the idea behind the X-Force Exchange, a 700-terabyte platform of aggregated cyber threat information IBM has built to foster cybersecurity collaboration. 

TOPICS:
Ensuring that digital content — whether it’s a short story by John Updike or a very rare audio recording of a vanished Native American language — lives on past its initial platform is one of the most pressing issues in preservation science. Harvard is one

Harvard Uses Forensics to Save Obsolete Digital Records

May 8, 2015 12:12 pm | by Kate Kondayen, Harvard university | Comments

Ensuring that digital content — whether it’s a short story by John Updike or a very rare audio recording of a vanished Native American language — lives on past its initial platform is one of the most pressing issues in preservation science. Harvard is one of a handful of cultural institutions in the first wave of adopting a technology and process to preserve its digital content.

TOPICS:
Federal investigators learned several hours before a provocative cartoon contest in Texas that a man under investigation for extremist activities might show up and alerted local authorities, but had no indication that he planned to attack the event, FBI D

FBI Sent Out Bulletin Based on Social Media Before Texas Attack

May 8, 2015 10:53 am | by Eric Tucker, Associated Press | Comments

Federal investigators learned several hours before a provocative cartoon contest in Texas that a man under investigation for extremist activities might show up and alerted local authorities, but had no indication that he planned to attack the event, FBI Director James Comey said recently.

TOPICS:
Advertisement
When Iran hacked the Navy-Marine Corps Intranet in fall 2013, it shook up the sea services’ approach to cybersecurity. Thanks to that new vigilance, their networks have fended off every subsequent attack, the head of Navy Cyber Command said recently.

Navy, Marine Cyber Fought Off All Net Attackers Since 2013

May 8, 2015 10:37 am | by Sydney J. Freedberg, Jr., Breaking Defense | Comments

When Iran hacked the Navy-Marine Corps Intranet in fall 2013, it shook up the sea services’ approach to cybersecurity. Thanks to that new vigilance, their networks have fended off every subsequent attack, the head of Navy Cyber Command said recently.

TOPICS:
China has included cybersecurity in a draft national security law, the latest in a string of moves by Beijing to bolster the legal framework protecting the country's information technology.

China Drafts Laws for a 'Sovereign' Cyberspace

May 8, 2015 10:05 am | Comments

China has included cybersecurity in a draft national security law, the latest in a string of moves by Beijing to bolster the legal framework protecting the country's information technology.

TOPICS:
The disappearance of Phillip Koss is just one of dozens of cases in which Diana Trepkov has participated during her career as a forensic artist. Her work, with law enforcement agencies across Canada and the United States, including Durham Regional Police,

Forensic Artist Combines Art and Science to Solve Mysteries of the Missing

May 8, 2015 8:22 am | by Jeff Mitchell, DurhamRegion.com | Comments

The disappearance of Phillip Koss is just one of dozens of cases in which Diana Trepkov has participated during her career as a forensic artist. Her work, with law enforcement agencies across Canada and the United States, including Durham Regional Police, has assisted in investigations into both missing persons cases and efforts to identify human remains.

TOPICS:
Much like a finger leaves its own unique print to help identify a person, researchers are now discovering that skull fractures leave certain signatures that can help investigators better determine what caused the injury. Implications from the research cou

'Fracture' Prints Help Solve Child Abuse Cases

May 8, 2015 8:20 am | by Michigan State University | Comments

Much like a finger leaves its own unique print to help identify a person, researchers are now discovering that skull fractures leave certain signatures that can help investigators better determine what caused the injury. Implications from the research could help with the determination of truth in child abuse cases, potentially resulting in very different outcomes.

TOPICS:
According to the U.S. Intelligence Community’s 2015 “Worldwide Threat Assessment” report, Russia and China are the "most sophisticated nation-state actors” in the new generation of cyberwarfare, and Russian hackers lead in terms of sophistication, program

Russia's Greatest Weapon May be Its Hackers

May 7, 2015 11:17 am | by Owen Matthews, Newsweek | Comments

According to the U.S. Intelligence Community’s 2015 “Worldwide Threat Assessment” report, Russia and China are the "most sophisticated nation-state actors” in the new generation of cyberwarfare, and Russian hackers lead in terms of sophistication, programming power and inventiveness. “The threat from China is overinflated, while the threat from Russia is underestimated,” says Jeffrey Carr, author of the book Inside Cyber Warfare.

TOPICS:
Advertisement
SAP is run by over 250,000 customers worldwide, including 98 percent of the 100 most valued brands. Despite housing an organization’s most valuable and sensitive information, SAP systems are not protected from cyber threats by traditional security approac

Top Cyber Attack Vectors for Critical SAP Systems

May 7, 2015 10:27 am | by Zeljka Zorn, Help Net Security | Comments

SAP is run by over 250,000 customers worldwide, including 98 percent of the 100 most valued brands. Despite housing an organization’s most valuable and sensitive information, SAP systems are not protected from cyber threats by traditional security approaches.

TOPICS:
Cloud providers, mobile device manufacturers, private citizens, and a bipartisan Congressional committee are lining up on the opposite side.

Law Enforcement Finding Few Allies On Encryption

May 7, 2015 10:09 am | by Sara Peters | Comments

Cloud providers, mobile device manufacturers, private citizens, and a bipartisan Congressional committee are lining up on the opposite side.

TOPICS:
The US Navy is reportedly looking for a new server supplier for some of its guided missile cruisers and destroyers due to security concerns around Lenovo’s recent purchase of IBM’s x86 server division.

US Navy Looks to Dump Lenovo Servers on Security Concerns - Report

May 7, 2015 9:45 am | by Phil Muncaster, Infosecurity Magazine | Comments

The US Navy is reportedly looking for a new server supplier for some of its guided missile cruisers and destroyers due to security concerns around Lenovo’s recent purchase of IBM’s x86 server division.

TOPICS:
Positive identification of unknown remains is essential to the resolution of criminal investigations, insurance claims, the facilitation of the release of the decedent to family for interment, and the emotional recovery of family and friends. Although rad

Three is the Magic Number for Positive ID

May 7, 2015 8:15 am | by Ann Ross, Alicja Lanfear and Ashley Maxwell, NIJ | Comments

Positive identification of unknown remains is essential to the resolution of criminal investigations, insurance claims, the facilitation of the release of the decedent to family for interment, and the emotional recovery of family and friends. Although radiographic comparisons are commonly used, to date, there has been little to no testing of the validity of using such methods to establish a positive identification.

TOPICS:
Cyber criminals are increasingly copying cyberespionage groups in using targeted attacks against their victims instead of large-scale, indiscriminate infection campaigns.

Cyber Criminals Borrow From APT Playbook in Attack Against PoS Vendors

May 6, 2015 1:17 pm | by Lucian Constantin, CSO | Comments

Cyber criminals are increasingly copying cyberespionage groups in using targeted attacks against their victims instead of large-scale, indiscriminate infection campaigns.

TOPICS:
The US Internet Revenue Service has launched a new unit dedicated to tackling the rising rate of identity theft through hacking.

IRS Sets Up Dedicated Cybercrime Unit to Combat Identity Theft

May 6, 2015 12:59 pm | by Charlie Osborne | Comments

The US Internet Revenue Service has launched a new unit dedicated to tackling the rising rate of identity theft through hacking.

TOPICS:
Spear phishing and its evolutions like the watering hole attack represent one of the most insidious attack techniques adopted by the majority of threat actors in cyberspace.

Spearphishing: A New Weapon in Cyber Terrorism

May 6, 2015 12:45 pm | by Pierluigi Paganini, Infosec Institute | Comments

Spear phishing and its evolutions like the watering hole attack represent one of the most insidious attack techniques adopted by the majority of threat actors in cyberspace.

TOPICS:

Pages

Advertisement
X
You may login with either your assigned username or your e-mail address.
The password field is case sensitive.
Loading