Advertisement
 
News
Subscribe to Forensic Magazine
View Sample

SUBSCRIBE TO FREE
Forensic Magazine
EMAIL NEWSLETTER

Spear phishing and its evolutions like the watering hole attack represent one of the most insidious attack techniques adopted by the majority of threat actors in cyberspace.

Spearphishing: A New Weapon in Cyber Terrorism

May 6, 2015 12:45 pm | by Pierluigi Paganini, Infosec Institute | Comments

Spear phishing and its evolutions like the watering hole attack represent one of the most insidious attack techniques adopted by the majority of threat actors in cyberspace.

TOPICS:
A convicted killer escaped from an Ohio prison farm in 1959, then was allowed to slip away from law enforcement in 1975 and disappeared until a ruse to get his fingerprints led to his arrest in Florida this week, investigators said Tuesday.

Fingerprint Ruse IDs Florida Man as Longtime Ohio Fugitive

May 6, 2015 8:29 am | by Kantele Franko and Mike Schneider, Associated Press | Comments

A convicted killer escaped from an Ohio prison farm in 1959, then was allowed to slip away from law enforcement in 1975 and disappeared until a ruse to get his fingerprints led to his arrest in Florida this week, investigators said Tuesday.

TOPICS:
Though a useful technique, the superglue fuming process requires a waiting period to harden and does not always provide a quality fingermark, particularly if it has been exposed to the elements for extended periods of time.

Fume at Lower Temperatures for Optimum Prints

May 6, 2015 8:28 am | by Mark D. Dadmun, NIJ | Comments

Though a useful technique, the superglue fuming process requires a waiting period to harden and does not always provide a quality fingermark, particularly if it has been exposed to the elements for extended periods of time.

TOPICS:
Advertisement
Researchers have uncovered new malware that takes extraordinary measures to evade detection and analysis, including deleting all hard drive data and rendering a computer inoperable.

Super Secretive Malware Wipes Hard Drive to Prevent Analysis

May 5, 2015 10:29 am | by Dan Goodin, Ars Technica | Comments

Researchers have uncovered new malware that takes extraordinary measures to evade detection and analysis, including deleting all hard drive data and rendering a computer inoperable.

TOPICS:

Year in Jail, No Indictment: Crime Lab Snafu Blamed

May 4, 2015 1:42 pm | by Kate Royals, The Clarion-Ledger | Comments

Despite six grand juries convening since his arrest, 45-year-old Eban Siler has not yet been served an indictment and can’t pay his $100,000 bond. He has been in Rankin County Jail since May 28 of last year.

TOPICS:
Rutgers University will allow professors to cancel final exams and is urging   flexibility in grading so that students don’t suffer because of a cyber attack that   hit the university last Monday and crippled Internet service for most of the week.

Rutgers Students Adjusts Grading, Final Exam Policies Due to Cyber Attack

May 4, 2015 1:28 pm | by Hannan Adely, The Record | Comments

Rutgers University will allow professors to cancel final exams and is urging flexibility in grading so that students don’t suffer because of a cyber attack that hit the university last Monday and crippled Internet service for most of the week.

TOPICS:
While California’s Silicon Valley is the technology capital of America, cities and states across the country are now vying to dominate the next big economic frontier – the booming market for securing what actually lies within the nation’s electronic netwo

How Will the Cyber Gold Rush Pan Out for Cities and States?

May 4, 2015 12:17 pm | by Sara Sorcher, The Christian Science Monitor | Comments

While California’s Silicon Valley is the technology capital of America, cities and states across the country are now vying to dominate the next big economic frontier – the booming market for securing what actually lies within the nation’s electronic networks. 

TOPICS:
The image of a cyber criminal might be of a geeky teenager drawn into the murky world of the Internet’s dark side while spending hours surfing online in the bedroom of his family home. But a new study has discovered that in fact most online crooks already

Digital Thieves Commit Non-Cyber Crimes

May 4, 2015 9:14 am | by Rosa Prince, The Telegraph | Comments

The image of a cyber criminal might be of a geeky teenager drawn into the murky world of the Internet’s dark side while spending hours surfing online in the bedroom of his family home. But a new study has discovered that in fact most online crooks already have a background in more traditional offending.

TOPICS:
Advertisement
They found a hand first, in a gritty inlet at the mouth of Coney Island Creek. Other body parts were found nearby, none of any use in identifying the person. A break in the case came in recent weeks. It started with a closer look at a patch of skin on par

Detectives Search for Clues to Killing in Victim's Tattoo

May 1, 2015 12:35 pm | by Michael Wilson, The New York Times | Comments

They found a hand first, in a gritty inlet at the mouth of Coney Island Creek. Other body parts were found nearby, none of any use in identifying the person. A break in the case came in recent weeks. It started with a closer look at a patch of skin on part of a leg — leading to the first bona fide clue that, upon further description, is not for the faint of heart.

TOPICS:
An effort before the Maine Legislature to set a blood limit standard for marijuana-impaired drivers was criticized by pot advocates on Thursday who said science doesn’t support it.

Debate Over Setting Blood Standard for Marijuana-Impaired Driving

May 1, 2015 12:13 pm | by Michael Shepherd, centralmaine.com | Comments

An effort before the Maine Legislature to set a blood limit standard for marijuana-impaired drivers was criticized by pot advocates on Thursday who said science doesn’t support it.

TOPICS:
UC Berkeley officials have announced that they are sending alert notices to current students and other individuals regarding a computer data breach that may have resulted in unauthorized access to their Social Security numbers or other personal informatio

UC Berkeley Campus Announces Data Breach

May 1, 2015 11:11 am | by Janet Gilmore, UC Berkeley | Comments

UC Berkeley officials have announced that they are sending alert notices to current students and other individuals regarding a computer data breach that may have resulted in unauthorized access to their Social Security numbers or other personal information.

TOPICS:
On Thursday, it was reported that a new service that warns when Google account users' passwords are phished had been bypassed by a drop-dead simple exploit, just 24 hours after Google had rolled out the Chrome plugin. Within hours of publication, Google i

Google's New Version of Password Alert Blocking Bypass is Bypassed

May 1, 2015 10:49 am | by Dan Goodin, Ars Technica | Comments

On Thursday, it was reported that a new service that warns when Google account users' passwords are phished had been bypassed by a drop-dead simple exploit, just 24 hours after Google had rolled out the Chrome plugin. Within hours of publication, Google issued an update that blocked the exploit. Now the same researcher has figured out a way to block the new version, too.

TOPICS:
The only thing worse than a data breach is not knowing how it happened. In order to prevent system failure, minimize the loss and prevent similar breaches, agencies need an incident response plan that includes forensic investigation.

Plan for the Next Breach With Incident Response Forensics

May 1, 2015 10:13 am | by (ISC)2 Government Advisory Council Executive Writers Bureau, Lou Magnotti | Comments

The only thing worse than a data breach is not knowing how it happened. In order to prevent system failure, minimize the loss and prevent similar breaches, agencies need an incident response plan that includes forensic investigation.

TOPICS:
This paper examines the history, types and culture of Computer Security Incident Response Teams (CSIRTs). It is intended to provide a short history and overview of the culture of CSIRTs in order to help build a common understanding.

History and Functions of Computer Security Incident Response Teams

May 1, 2015 10:03 am | by Isabel Skierka, Mirko Hohmann, Robert Morgus and Tim Maurer, New America Foundation | Comments

This paper examines the history, types and culture of Computer Security Incident Response Teams (CSIRTs). It is intended to provide a short history and overview of the culture of CSIRTs in order to help build a common understanding.

TOPICS:
A former National Security Agency official turned whistleblower has spent almost a decade and a half in civilian life. And he says he's still "pissed" by what he's seen leak in the past two years.

NSA So Overwhelmed With Data, It's No Longer Effective, Says Whistleblower

May 1, 2015 9:34 am | by Zack Whittaker, ZD Net | Comments

A former National Security Agency official turned whistleblower has spent almost a decade and a half in civilian life. And he says he's still "pissed" by what he's seen leak in the past two years.

TOPICS:

Pages

Advertisement
X
You may login with either your assigned username or your e-mail address.
The password field is case sensitive.
Loading