Advertisement
 
Network Forensics
Subscribe to Network Forensics

The Lead

The computer server that transmitted and received Hillary Clinton's emails — on a private account she used exclusively for official business when she was secretary of state — traced back to an Internet service registered to her family's home in Chappaqua,

Clinton Ran Homebrew Computer System for Official Emails

March 4, 2015 12:40 pm | by Jack Gillum and Ted Bridis, Associated Press | News | Comments

The computer server that transmitted and received Hillary Clinton's emails — on a private account she used exclusively for official business when she was secretary of state — traced back to an Internet service registered to her family's home in Chappaqua, New York, according to Internet records reviewed by The Associated Press.

US Air Traffic Control System is Riddled With Vulnerabilities

March 4, 2015 11:09 am | by Zeljka Zorn, Help Net Security | News | Comments

A recently released report by the US Government Accountability Office has revealed that despite...

Apple Pay Under Fire After Account Takeovers Soar

March 4, 2015 10:58 am | by Phil Muncaster, Infosecurity Magazine | News | Comments

US criminal gangs are taking advantage of security gaps in the provisioning of new cards to...

'FREAK' Flaw in Android and Apple Devices Breaks HTTPS Encryption

March 4, 2015 10:41 am | by Dan Goodin, Ars Technica | News | Comments

Security experts have discovered a potentially catastrophic flaw that for more than a decade has...

View Sample

SUBSCRIBE TO FREE Forensic Magazine EMAIL NEWSLETTER

The Internet of Things comprises networks of remote sensors capable of detecting everything from traffic to air quality, to buildings' energy consumption, to the direction of gunshots on city streets. And governments see plenty of opportunities to exploit

Chicago, Argonne Lab Deploy Internet of Super Sensors

March 3, 2015 9:53 am | by Patrick Marshall, GCN | News | Comments

The Internet of Things comprises networks of remote sensors capable of detecting everything from traffic to air quality, to buildings' energy consumption, to the direction of gunshots on city streets. And governments see plenty of opportunities, but the real action in implementing IoT in a public sector environment is taking place in collaborations between federal research labs and the cities where they are based.

The US military's cyber warriors, unlike soldiers patrolling a battlefield overseas, will not hear the sound of an attack coming. The Pentagon's research arm wants to change this.

DARPA's Plan X for the Future

March 2, 2015 11:43 am | by Sara Sorcher, Passcode | News | Comments

The US military's cyber warriors, unlike soldiers patrolling a battlefield overseas, will not hear the sound of an attack coming. The Pentagon's research arm wants to change this.

Recently, attackers allegedly associated with the fame-seeking group Lizard Squad briefly hijacked Google’s Vietnam domain (google.com.vn). On Wednesday, Lenovo.com was similarly attacked. Sources now tell KrebsOnSecurity that both hijacks were possible b

Webnic Registrar Blamed for Hijack of Lenovo, Google Domains

February 27, 2015 9:05 am | by Brian Krebs | Blogs | Comments

Recently, attackers allegedly associated with the fame-seeking group Lizard Squad briefly hijacked Google’s Vietnam domain (google.com.vn). On Wednesday, Lenovo.com was similarly attacked. Sources now tell KrebsOnSecurity that both hijacks were possible because the attackers seized control over Webnic.cc, the Malaysian registrar that serves both domains and 600,000 others.  

Advertisement
Police in Europe say they've disrupted a botnet that has been serving up worldwide infections of the banking malware known as Ramnit.

Police Disrupt Banking Malware Botnet

February 25, 2015 10:17 am | by Mathew J. Schwartz, Gov Info Security | News | Comments

Police in Europe say they've disrupted a botnet that has been serving up worldwide infections of the banking malware known as Ramnit.

Washington, D.C.-based R&K Cyber Solutions LLC has licensed Hyperion, a cyber security technology from the Department of Energy's Oak Ridge National Laboratory that can quickly recognize malicious software even if the specific program has not been previou

Cybersecurity Service Licenses ORNL Malware Detection Technology

February 24, 2015 12:58 pm | by Oak Ridge National Laboratory | News | Comments

Washington, D.C.-based R&K Cyber Solutions LLC has licensed Hyperion, a cyber security technology from the Department of Energy's Oak Ridge National Laboratory that can quickly recognize malicious software even if the specific program has not been previously identified as a threat.

We are bored with e-discovery. It hasn’t gone away, as some foolishly imagined it might. Most have endured rather than embraced e-discovery. The level of discourse about sources and process isn’t much higher than it was a decade ago despite the ascendency

Ennui: Have We Grown Weary of e-Discovery?

February 24, 2015 12:41 pm | by Craig Ball | Blogs | Comments

We are bored with e-discovery. It hasn’t gone away, as some foolishly imagined it might. Most have endured rather than embraced e-discovery. The level of discourse about sources and process isn’t much higher than it was a decade ago despite the ascendency of social networking, cloud computing and mobile devices.

Two more software makers have been caught adding dangerous, Superfish-style man-in-the-middle code to the applications they publish. The development is significant because it involves AV company Lavasoft and Comodo, a company that issues roughly one-third

Security Software Found Using Superfish-Style Code

February 23, 2015 3:14 pm | by Dan Goodin, Ars Technica | News | Comments

Two more software makers have been caught adding dangerous, Superfish-style man-in-the-middle code to the applications they publish. The development is significant because it involves AV company Lavasoft and Comodo, a company that issues roughly one-third of the Internet's Transport Layer Security certificates, making it the world's biggest certificate authority.

Last year, nude photos of celebrities were hacked through iCloud. Online robbers also made off with millions of credit card numbers at Home Depot and Target. By year-end, the latest Seth Rogen comedy was fueling an international imbroglio replete with tit

'Juicy' Hackers Protect Data, Thwart Cybercrime

February 23, 2015 10:40 am | by Brennen Jensen, Johns Hopkins Gazette | News | Comments

Last year, nude photos of celebrities were hacked through iCloud. Online robbers also made off with millions of credit card numbers at Home Depot and Target. By year-end, the latest Seth Rogen comedy was fueling an international imbroglio replete with tit-for-tat cyber attacks. Welcome to Anton Dahbura's world.

Advertisement
The exposure of an all-star hacker group thought to be affiliated with the National Security Agency is both a feather in the spy agency’s cap and a setback for intelligence-gathering on Islamic extremists, some threat analysts say.

NSA Out-Hacking Chinese, Russians

February 20, 2015 10:42 am | by Aliya Sternstein, Defense One | News | Comments

The exposure of an all-star hacker group thought to be affiliated with the National Security Agency is both a feather in the spy agency’s cap and a setback for intelligence-gathering on Islamic extremists, some threat analysts say.

The Deep Web, the bit of the World Wide Web that's not indexed by search engines like Google and Bing, is of intense interest to people who want to avoid government spies and law enforcement.

The Dark Web: Anarchy, Law, Freedom and Anonymity

February 20, 2015 10:19 am | by Mark Stockley | Blogs | Comments

The Deep Web, the bit of the World Wide Web that's not indexed by search engines like Google and Bing, is of intense interest to people who want to avoid government spies and law enforcement.

The National Cybersecurity Center of Excellence (NCCoE) is seeking collaborators on an effort to help energy companies improve the security of the networked technologies they rely upon to control the generation, transmission and distribution of power.

Vendors Sought to Develop Model System to Monitor Security of Energy Industry Networked Control Systems

February 19, 2015 12:10 pm | by NIST | News | Comments

The National Cybersecurity Center of Excellence (NCCoE) is seeking collaborators on an effort to help energy companies improve the security of the networked technologies they rely upon to control the generation, transmission and distribution of power. 

Unraveling a mystery that eluded the researchers analyzing the highly advanced Equation Group the world learned about Monday, password crackers have deciphered a cryptographic hash buried in one of the hacking crew's exploits. It's Arabic for "unregistere

Password Cracking Experts Decipher Equation Group Crypto Hash

February 17, 2015 12:39 pm | by Dan Goodin, Ars Technica | News | Comments

Unraveling a mystery that eluded the researchers analyzing the highly advanced Equation Group the world learned about recently, password crackers have deciphered a cryptographic hash buried in one of the hacking crew's exploits. It's Arabic for "unregistered."

In late 2013, an ATM in Kiev started dispensing cash at seemingly random times of day. No one had put in a card or touched a button. Cameras showed that the piles of money had been swept up by customers who appeared lucky to be there at the right moment.

Bank Hackers Steal Millions With Malware

February 17, 2015 12:10 pm | by David E. Sanger and Nicole Perlroth, The New York Times | News | Comments

In late 2013, an ATM in Kiev started dispensing cash at seemingly random times of day. No one had put in a card or touched a button. Cameras showed that the piles of money had been swept up by customers who appeared lucky to be there at the right moment. But when a Russian cybersecurity firm, Kaspersky Lab, was called to Ukraine to investigate, it discovered that the errant machine was the least of the bank’s problems.

Advertisement
They're the emergency responders of the computer industry. CEO David DeWalt of Silicon Valley cybersecurity firm FireEye refers to his digital investigators as "cyber SEALs" — as in Navy SEALs, not the cuddly sea mammals. When big corporations like Sony P

FireEye is 'first in the door' on Big Cyber Attacks

February 12, 2015 12:52 pm | by Brandon Bailey, Associated Press | News | Comments

They're the emergency responders of the computer industry. CEO David DeWalt of Silicon Valley cybersecurity firm FireEye refers to his digital investigators as "cyber SEALs" — as in Navy SEALs, not the cuddly sea mammals. When big corporations like Sony Pictures, JPMorgan Chase, Target or Anthem suffered malicious hacks and data breaches that threatened their operations and reputations, they called in FireEye.

A new search engine being developed by DARPA aims to shine a light on the dark web and uncover patterns and relationships in online data to help law enforcement and others track illegal activity.

DARPA Developing Dark Web Search Engine

February 10, 2015 12:07 pm | by Kim Zetter, Wired | News | Comments

A new search engine being developed by DARPA aims to shine a light on the dark web and uncover patterns and relationships in online data to help law enforcement and others track illegal activity.               

Since hackers first began demonstrating that they could take over cars’ digital systems to slam on brakes or hijack steering, most automakers have done everything they can to avoid publicly discussing whether their vehicles are vulnerable. Massachusetts S

Senate Report Reveals Easy-to-Hack Cars

February 9, 2015 2:47 pm | by Andy Greenberg, Wired | News | Comments

Since hackers first began demonstrating that they could take over cars’ digital systems to slam on brakes or hijack steering, most automakers have done everything they can to avoid publicly discussing whether their vehicles are vulnerable. Massachusetts Senator Edward Markey, however, has demanded answers on that car-hacking question. Now he’s released his findings.

Utah state officials have seen what they describe as a sharp uptick in attempts to hack into state computers in the last two years, and they think it related to the NSA data center south of Salt Lake City.

Cyber Attacks Rising Around Utah NSA Facility

February 9, 2015 8:36 am | by Brady McCombs, Associated Press | News | Comments

Utah state officials have seen what they describe as a sharp uptick in attempts to hack into state computers in the last two years, and they think it related to the NSA data center south of Salt Lake City.             

The recent hack of millions of patient records at health insurer Anthem has brought   out what has become the usual accusations toward China as a state-sponsored actor.   As with other breaches, experts are saying that it is too soon to provide   attribut

State-sponsored Finger Points at China Again

February 6, 2015 12:58 pm | by Ernie Austin, Associate Editor | News | Comments

The recent hack of millions of patient records at health insurer Anthem has brought out what has become the usual accusations toward China as a state-sponsored actor. As with other breaches, experts are saying that it is too soon to provide attribution.

The White House is creating a cyber squad to address the security of it's   govenmental websites. The dot-gov initiative is part of the Obama Administration's   attempt to fulfill the Office of Management and Budget's role in securing federal   government

White House Creates Cyber Unit to Oversee Government Networks

February 6, 2015 11:48 am | by Ernie Austin, Associate Editor | News | Comments

The White House is creating a cyber squad to address the security of it's governmental websites. The dot-gov initiative is part of the Obama Administration's attempt to fulfill the Office of Management and Budget's role in securing federal government agency networks.

Researchers report that just four fairly vague pieces of information — the dates and locations of four purchases — are enough to identify 90 percent of the people in a data set recording three months of credit-card transactions by 1.1 million users.

Credit Card Data Not as Anonymous as Thought

January 30, 2015 10:13 am | by Larry Hardesty, MIT / Seth Borenstein and Jack Gillum, Associated Press | News | Comments

Researchers report that just four fairly vague pieces of information — the dates and locations of four purchases — are enough to identify 90 percent of the people in a data set recording three months of credit-card transactions by 1.1 million users.

With cyber attacks on the rise, information security has become one of the country’s   fastest growing fields, with a projected 10-year growth rate of 37 percent,   according to the Bureau of Labor Statistics. To help address the critical shortage   of cy

Capella University Offers New Graduate Certificates in Digital Forensics and Network Defense

January 30, 2015 8:16 am | by Capella University | News | Comments

With cyber attacks on the rise, information security has become one of the country’s fastest growing fields, with a projected 10-year growth rate of 37 percent, according to the Bureau of Labor Statistics. To help address the critical shortage of cybersecurity specialists, Capella University has launched two new graduate certificates in Digital Forensics and Network Defense.

The Chinese government has adopted new regulations requiring companies that sell computer equipment to Chinese banks to turn over secret source code, submit to invasive audits and build so-called back doors into hardware and software, according to a copy

New Tech Rules in China Upset Western Companies

January 29, 2015 10:28 am | by Paul Mozur, The New York Times | News | Comments

The Chinese government has adopted new regulations requiring companies that sell computer equipment to Chinese banks to turn over secret source code, submit to invasive audits and build so-called back doors into hardware and software, according to a copy of the rules obtained by foreign technology companies that do billions of dollars’ worth of business in China.

The infamous Regin trojan is likely to have been developed by the NSA or one of its allies, after security experts found a number of similarities between it and code discovered amongst leaked Edward Snowden documents.

Regin was Work of Five Eyes Spooks, Analysis Reveals

January 29, 2015 9:41 am | by Phil Muncaster, Infosecurity Magazine | News | Comments

The infamous Regin trojan is likely to have been developed by the NSA or one of its allies, after security experts found a number of similarities between it and code discovered amongst leaked Edward Snowden documents.         

When operating outside of the law, you can't rely on the police to protect your   illegal enterprise from other criminals. The Silk Road marketplace founders likely   learned this lesson in 2012 and 2013, after paying thousands of dollars to cyber   extor

Hackers Extorted Thousands from Silk Road Operators

January 29, 2015 9:29 am | by Joab Jackson, Computerworld | News | Comments

When operating outside of the law, you can't rely on the police to protect your illegal enterprise from other criminals. The Silk Road marketplace founders likely learned this lesson in 2012 and 2013, after paying thousands of dollars to cyber extortionists.

According to a recent alert from the FBI, cyber thieves stole nearly $215 million from businesses in the last 14 months using a scam that starts when business executives or employees have their email accounts hijacked.

FBI: Businesses Lost $215M to Email Scams

January 29, 2015 8:11 am | by Brian Krebs | Blogs | Comments

According to a recent alert from the FBI, cyber thieves stole nearly $215 million from businesses in the last 14 months using a scam that starts when business executives or employees have their email accounts hijacked.         

Advertisement
X
You may login with either your assigned username or your e-mail address.
The password field is case sensitive.
Loading