The computer server that transmitted and received Hillary Clinton's emails — on a private account she used exclusively for official business when she was secretary of state — traced back to an Internet service registered to her family's home in Chappaqua, New York, according to Internet records reviewed by The Associated Press.
The nation-state Equation Group compromise of most popular hard drives won't be a widespread...
This post is about employing various data sources and analysis techniques, and pivoting in order...
Recently, attackers allegedly associated with the fame-seeking group Lizard Squad briefly...
Hackers have been stealing the secret algorithms and tactics used by hedge funds and high-frequency trading firms, according to two security companies.
A team of computer scientists have devised as way to lift the veil of anonymity protecting cyber criminals by turning their malicious code against them.
Belkasoft has entered a strategic partnership with Passware, a leading provider of password recovery and e-Discovery software for Federal and State agencies, Fortune 500 corporations, law enforcement, military organizations, help desk personnel, business and private consumers.
When Kaspersky Lab revealed that it had uncovered a sophisticated piece of malware designed to plant malicious code inside the firmware of computers, it should have surprised no one.
Washington, D.C.-based R&K Cyber Solutions LLC has licensed Hyperion, a cyber security technology from the Department of Energy's Oak Ridge National Laboratory that can quickly recognize malicious software even if the specific program has not been previously identified as a threat.
We are bored with e-discovery. It hasn’t gone away, as some foolishly imagined it might. Most have endured rather than embraced e-discovery. The level of discourse about sources and process isn’t much higher than it was a decade ago despite the ascendency of social networking, cloud computing and mobile devices.
China's Lenovo Group Ltd, the world's largest PC maker, had pre-installed a virus-like software on laptops that makes the devices more vulnerable to hacking, cybersecurity experts say.
After listening to colleagues for years and exploring it further, Jonathan Grier saw how pressing the need was for technology like his. Although the NIJ was the organization that bridged the gap between idea and practical application for his technology, it was another agency that saw its possibility.
Depending upon the nature of investigations, timely forensic examinations normally can expedite the apprehension of suspects. The use of a triage tool can identify the most likely evidentiary data sources. Ideally, the relevant evidence should then be seamlessly exported and analyzed in-depth by another comprehensive forensic tool which can provide indexing and detailed analysis.
Unraveling a mystery that eluded the researchers analyzing the highly advanced Equation Group the world learned about recently, password crackers have deciphered a cryptographic hash buried in one of the hacking crew's exploits. It's Arabic for "unregistered."
Microsoft recently released an update (KB 3004375) that allows certain versions the Windows OS to record command line options, if Process Tracking is enabled, in the Windows Event Log. Microsoft also recently upgraded Sysmon to version 2.0, with some interesting new capabilities.
Emoji are the language of our online era. They convey things mere words often cannot. We send emoji to improve upon, even expand, our words and bring emotion—affection, frustration, love, anger—to the conversation. Now, like the tweets, posts, and texts that are a crucial part of the way we communicate today, emoji are, finally, getting their due in court.
A recent Duo Tech Talk featured Ivan Leichtling of Yelp, the company behind the website and mobile app that publishes crowd-sourced reviews about local businesses. Ivan lead a talk at Duo on OSXCollector, an open source forensic evidence collection and analysis toolkit for OS X developed in-house at Yelp.
In the second part of our discussion about the benefits of government contracts to digital forensic investigation, Forensic Magazine talks to Jonathan Grier, principle of Grier Forensics. Grier's sifting technology speeds the investigation of computer hard drives by pinpointing usable data — the data important to a case. In this part, we find out from Jonathan Grier how this technology works.
Process hollowing (a.k.a. process replacement) is a technique malware uses to overwrite a running process with a malicious code. To me it's the technical equivalent of those alien body snatchers. This post explores process hollowing techniques using the Cuckoo Sandbox.
It is often the case that the spur to innovation in America takes the form of a government solicitation. As an instrument of the people, the government gives power to the those that develop ideas and tools that benefit everyone. Forensic tools are no exception. To this end, Forensic Magazine spoke with Martin Novak, Program Manager at NIJ, and Jonathan Grier, principle of Grier Forensics, about Grier's recent contract award.
Another day, another data breach, and another round of calls for companies to encrypt their databases. Cryptography is a powerful tool, but in cases like this one it's not going to help. If your OS is secure, you don't need the crypto; if it's not, the crypto won't protect your data.
The man who built the free email encryption software used by whistleblower Edward Snowden, as well as hundreds of thousands of journalists, dissidents and security-minded people around the world, is running out of money to keep his project alive.
An extensive and sophisticated cyber espionage operation targeting mainly Western military, government, defense industry firms, and the media, now has a new weapon: a spyware app for Apple iPhones and iPads.
Overall, cookies are a satisfactory way to handle tracking online. They're simple, reliable, useful, proven, easy to understand, easy for vendors to implement, and easy for users to control. And that's exactly why people who are really serious about tracking you online don't rely on cookies.
The U.S. Army has released to open source an internal forensics analysis framework that the Army Research Lab has been using for some time.
Red Hat Inc and other makers of the widely used Linux operating system for business computers updated their software on Tuesday to thwart a serious new cyber threat they warned could allow hackers to gain remote control of their systems.
From the Heartbleed bug to the Target security breach, malicious hackers have proved to be detrimental to companies’ financial assets and reputations. To combat these malevolent attackers, or “black hats,” a community of benign hackers, “white hats,” has been making significant contributions to cybersecurity by detecting vulnerabilities in companies’ software systems and websites and communicating their findings.
Depending upon the nature of investigations, timely forensic examinations normally can expedite the apprehension of suspects. Conversely, delayed results can lead to suspects remaining free for extended periods of time, thereby allowing them to potentially commit other crimes.
- Page 1