The U.S. Army has released to open source an internal forensics analysis framework that the Army Research Lab has been using for some time.
Red Hat Inc and other makers of the widely used Linux operating system for business computers...
From the Heartbleed bug to the Target security breach, malicious hackers have proved to be...
Depending upon the nature of investigations, timely forensic examinations normally can expedite the...
Chinese online censorship body the Cyberspace Administration of China (CAC) has hit back at claims made by activists this week that the authorities allowed a Man in the Middle (MITM) attack against Outlook users in the country.
Prolific researcher Kafeine today called for Windows users to disable Adobe Flash Player in the wake of his discovery of an exploit for a previously unknown Flash flaw being packaged with a notorious crimeware kit.
Silent Shield has released P2P Decryptor, its peer-to-peer decryption and reporting software. Training is also offered exclusively for law enforcement at no charge in Atlanta, Georgia, January 28, 2015.
Police investigators working to identify victims, find criminals and bring cases to court have revealed that huge increases in the volume of visual evidence, data seized and sheer number of caseloads are the biggest challenges they are facing.
Securcube’s Phonelog is an elaborate and intuitive solution for Call Detail Record analysis. Phone Log is equipped with cutting-edge technologies that perform quick, automated, and comprehensive data analyses and, among other functions, correlates phone numbers, tracks BTS cell traffic, accesses IMSI and IMEI logs.
Recently, Johannes Ullrich, Chief Technology Officer of the SANS Internet Storm Center spoke with Forensic Magazine about a case presented at 31C3 2014. He helps us understand how this unusual email attack could be a nation-state-level operation.
The newly-discovered "Skeleton Key" malware is able to circumvent authentication on Active Directory systems, according to Dell researchers.
Federal agencies are big users of antivirus software, and regardless of their technical competence, government security professionals still find themselves victims of malware. Unfortunately, simply installing antivirus technology does not protect today’s endpoints.
If you’re sitting in a coffee shop, tapping away on your laptop, feeling safe from hackers because you didn’t connect to the shop’s wifi, think again. The bad guys may be able to see what you’re doing just by analyzing the low-power electronic signals your laptop emits even when it’s not connected to the Internet.
I sometimes get questions about showing attachments in Apple iDevice messaging databases. The questions, however, seem to come at a time when I don’t have any databases on hand to study the issue. Well, this week I stumbled on the chats.db during an exam of a MacBook Air.
French authorities continue to investigate the January 7 attack in Paris that claimed the lives of a dozen, including journalists and police officers. As they do so, experts with digital forensics and other information security skills will be crucial for continuing to advance the investigation.
A UK consultant has demonstrated how a feature of the secure Web protocol HTTPS can be turned into a tracking feature that is, in the case of some browsers, ineradicable.
From a historical perspective, mankind’s recording and storing of information has progressed from the crude writings, carvings and paintings found on rocks, in caves and on scrolls to today’s digitization of virtually everything imaginable. The invention of the computer has made this possible.
On Monday, a federal judge in Nebraska sentenced the former acting director of cybersecurity for the US Department of Health and Human Services to 25 years in prison on child porn charges.
I recently analyzed a malicious document, by opening it on a virtual machine; this was intended to simulate a user opening the document, and the purpose was to determine and document artifacts associated with the system being infected.
In late November, a court case in Calgary, Canada, set an unusual record. Lawyers representing a personal trainer injured in an accident were the first to wield data from a wearable device in the courtroom. They planned to use the sluggish activity levels recorded by their client's Fitbit fitness tracker to prove the lasting effect of her accident.
Change is one of the only constants in incident response. In time most things will change; technology, tools, processes, and techniques all eventually change. The change is not only limited to the things we rely on to be the last line of defense for our organizations and/or customers.
To Deschutes County Sheriff’s Sgt. Tom Nelson, Bend was primarily a prime fishing spot. It was 2002 and Nelson was planning to retire from the Portland Police Bureau after nearly 30 years of service. But then he was recruited by then-Sheriff Les Stiles to head a new computer forensics unit for the sheriff’s office.
Depending upon the nature of investigations, timely forensic examinations normally can expedite the apprehension of suspects. The use of a triage tool can identify the most likely evidentiary data sources. Ideally, the relevant evidence should then be seamlessly exported and analyzed in-depth by another comprehensive forensic tool which can provide indexing and detailed analysis.
Police tracking down a suspected killer came across a telling piece of evidence that led to an arrest: A cellphone, logged into a man's Facebook account, with a news photo of the crime scene as the background screen.
It has now reached the point that it is no longer practical for an examiner to forensically analyze each and every piece of evidence. Depending upon the alleged crime, often the incriminating evidence can be found in an e-mail, a document, the browser history, an SMS, or some other source. This leads to the obvious conclusion that examiners are going to need a new approach to streamline their workflow.
When a woman's bullet-riddled body was found under the France Road overpass in Desire on the sweltering morning of July 29, New Orleans police initially had few clues with which to work.
Forensic inspectors are hunting video evidence on wireless phones that police seized in the investigation of two Destrehan High School teachers who are accused of engaging in group sex with one of their English students, authorities say.
Often an examiner will analyze all the digital media only to determine that the probative data was limited to a browser’s history file, an e-mail, a document, the mobile devices’ logs, or an inappropriate graphic video or picture. Finding the critical probative data faster in a cost effective manner while reducing or eliminating case backlogs is going to require a more efficient methodology.
Civil Air Patrol officials say cell phone forensics have helped authorities narrow the search area for a missing small airplane which hasn't been seen since leaving the Headland airport in Henry County, Alabama.
- Page 1