Advertisement
 
Network Forensics
Subscribe to Network Forensics

The Lead

Tens of thousands of HTTPS-protected websites, mail servers, and other widely used Internet services are vulnerable to a new attack that lets eavesdroppers read and modify data passing through encrypted connections, a team of computer scientists has found

HTTPS-Crippling Attack Threatens Tens of Thousands of Web and Mail Servers

May 21, 2015 2:09 pm | by Dan Goodin, Ars Technica | News | Comments

Tens of thousands of HTTPS-protected websites, mail servers, and other widely used Internet services are vulnerable to a new attack that lets eavesdroppers read and modify data passing through encrypted connections, a team of computer scientists has found.

The Cybercriminal Takedown: Part 2 With John Bambenek

May 20, 2015 9:00 am | by Ernie Austin, Associate Editor | Articles | Comments

John Bambenek, a handler for the Internet Storm Center at the SANS Institute continues his...

Bots Now Outnumber Humans on the Web

May 18, 2015 11:55 am | by Maria Korolov, CSO | News | Comments

Bot traffic has surpassed human traffic this year, now accounting for 59 percent of all site...

Penn State Network Disabled in Response to Sophisticated Cyber Attack

May 18, 2015 9:38 am | by Penn State University | News | Comments

The Penn State College of Engineering has been the target of two sophisticated cyber attacks...

This year, digital forensic practitioners gather at Ceasar's Palace in Las Vegas to expand their expertise at the Computer and Enterprise Investigations Conference (CEIC) 2015, May 18-21. For those who don't want to gamble with their organization's securi

On the Road to Vegas ... CEIC 2015 That Is

May 15, 2015 1:32 pm | by Ernie Austin, Associate Editor | Articles | Comments

This year, digital forensic practitioners gather at Ceasar's Palace in Las Vegas to expand their expertise at the Computer and Enterprise Investigations Conference (CEIC) 2015, May 18-21. For those who don't want to gamble with their organization's security in today's threat landscape, CEIC offers hands-on training labs, classrooms and presentations from some of the most well-known experts in their fields. 

APTs are designed to gain access to a network, acquire data, and secretly monitor the   targeted computer systems over long periods. Many researchers agree that the term   “Advanced Persistent Threat” was first coined by the U.S. Government during 2005 by

Anatomy of an APT Attack: Step by Step Approach

May 14, 2015 12:38 pm | by Ashiq JA, Infosec Institute | News | Comments

APTs are designed to gain access to a network, acquire data, and secretly monitor the targeted computer systems over long periods. Many researchers agree that the term “Advanced Persistent Threat” was first coined by the U.S. Government during 2005 by security analysts to describe complex cyber attacks against specific targets for financial or informational gains by a well-funded group of individuals.  

A massive DDoS botnet made up of a slave network of hijacked home and office routers has been revealed.

DDoS Botnet Makes Slaves of Home and Office Routers

May 13, 2015 12:59 pm | by Charlie Osborne, ZD Net | News | Comments

A massive DDoS botnet made up of a slave network of hijacked home and office routers has been revealed.

Advertisement
Scammers are actively targeting Starbucks customers and syphoning money from the credit or debit card they have tied to their Starbucks accounts.

Scammers Draining Payment Cards Linked to Starbucks Card Accounts

May 13, 2015 12:51 pm | by Zeljka Zorz, Help Net Security | News | Comments

Scammers are actively targeting Starbucks customers and syphoning money from the credit or debit card they have tied to their Starbucks accounts.

Is it possible to eradicate the workings of cyber criminals? Takedown experts would say, yes. One of those experts, John Bambenek, tells DFI News how he disrupts criminal malware networks.

Internet Takedowns and Incident Response: Q&A With John Bambenek

May 13, 2015 12:30 pm | by Ernie Austin, Associate Editor | Articles | Comments

Is it possible to eradicate the workings of cyber criminals? Takedown experts would say, yes. One of those experts, John Bambenek, tells DFI News how he disrupts criminal malware networks.

China has included cybersecurity in a draft national security law, the latest in a string of moves by Beijing to bolster the legal framework protecting the country's information technology.

China Drafts Laws for a 'Sovereign' Cyberspace

May 8, 2015 10:05 am | News | Comments

China has included cybersecurity in a draft national security law, the latest in a string of moves by Beijing to bolster the legal framework protecting the country's information technology.

Cloud providers, mobile device manufacturers, private citizens, and a bipartisan Congressional committee are lining up on the opposite side.

Law Enforcement Finding Few Allies On Encryption

May 7, 2015 10:09 am | by Sara Peters | News | Comments

Cloud providers, mobile device manufacturers, private citizens, and a bipartisan Congressional committee are lining up on the opposite side.

Unfortunately, many companies have entered the cloud without first checking the weather. Cloud services have skyrocketed primarily because they’re cheaper and more convenient than the alternative. What happens if the cloud gets stormy, you suffer a breach

Legal Issues with Cloud Forensics

May 7, 2015 9:33 am | by David Wilson | Articles | Comments

Unfortunately, many companies have entered the cloud without first checking the weather. Cloud services have skyrocketed primarily because they’re cheaper and more convenient than the alternative. What happens if the cloud gets stormy, you suffer a breach, and you find yourself in the position of having to conduct digital forensics? What now?

Advertisement
Cyber criminals are increasingly copying cyberespionage groups in using targeted attacks against their victims instead of large-scale, indiscriminate infection campaigns.

Cyber Criminals Borrow From APT Playbook in Attack Against PoS Vendors

May 6, 2015 1:17 pm | by Lucian Constantin, CSO | News | Comments

Cyber criminals are increasingly copying cyberespionage groups in using targeted attacks against their victims instead of large-scale, indiscriminate infection campaigns.

Digital forensic investigators can now extract information from a Sony PlayStation 4 console using a method developed by researchers in Australia.

PlayStation 4 Digital Traces Not Found in the Device

May 6, 2015 12:36 pm | by Ernie Austin, Newsletter Editor | Articles | Comments

Digital forensic investigators can now extract information from a Sony PlayStation 4 console using a method developed by researchers in Australia. That research explored the Web browsing and communication features of game consoles, which could be sources of evidence in criminal cases.

UC Berkeley officials have announced that they are sending alert notices to current students and other individuals regarding a computer data breach that may have resulted in unauthorized access to their Social Security numbers or other personal informatio

UC Berkeley Campus Announces Data Breach

May 1, 2015 11:11 am | by Janet Gilmore, UC Berkeley | News | Comments

UC Berkeley officials have announced that they are sending alert notices to current students and other individuals regarding a computer data breach that may have resulted in unauthorized access to their Social Security numbers or other personal information.

Royal Canadian Mounted Police have arrested a 27-year-old woman who allegedly installed malware on people's computers, and allegedly eavesdropped on private conversations and spooked her victims by talking to them through their infected computers' speaker

Woman Arrested After Hijacking PCs, Showing Hardcore Porn to Victims

May 1, 2015 10:37 am | by Lisa Vaas | Blogs | Comments

Royal Canadian Mounted Police have arrested a 27-year-old woman who allegedly installed malware on people's computers, and allegedly eavesdropped on private conversations and spooked her victims by talking to them through their infected computers' speakers.

The only thing worse than a data breach is not knowing how it happened. In order to prevent system failure, minimize the loss and prevent similar breaches, agencies need an incident response plan that includes forensic investigation.

Plan for the Next Breach With Incident Response Forensics

May 1, 2015 10:13 am | by (ISC)2 Government Advisory Council Executive Writers Bureau, Lou Magnotti | News | Comments

The only thing worse than a data breach is not knowing how it happened. In order to prevent system failure, minimize the loss and prevent similar breaches, agencies need an incident response plan that includes forensic investigation.

Advertisement
This paper examines the history, types and culture of Computer Security Incident Response Teams (CSIRTs). It is intended to provide a short history and overview of the culture of CSIRTs in order to help build a common understanding.

History and Functions of Computer Security Incident Response Teams

May 1, 2015 10:03 am | by Isabel Skierka, Mirko Hohmann, Robert Morgus and Tim Maurer, New America Foundation | News | Comments

This paper examines the history, types and culture of Computer Security Incident Response Teams (CSIRTs). It is intended to provide a short history and overview of the culture of CSIRTs in order to help build a common understanding.

Researchers at the University of Washington examined a product that came out of their own university's research - a teleoperated, robotic surgery system called the Raven II - and found that, like just about anything, it's susceptible to cyber security thr

Remotely Operated Surgery Robot Easy to eHijack, Researchers Find

April 30, 2015 1:02 pm | by Lisa Vaas | Blogs | Comments

Researchers at the University of Washington examined a product that came out of their own university's research - a teleoperated, robotic surgery system called the Raven II - and found that, like just about anything, it's susceptible to cyber security threats, including being forced to ignore or override surgeon's commands.

The top cyber official for the Air Force says the service’s space and satellite networks are being constantly hacked by outside groups.

Cyber General: US Satellite Networks Hit by 'Millions' of Hacks

April 30, 2015 12:19 pm | by Martin Matishak, The Hill | News | Comments

The top cyber official for the Air Force says the service’s space and satellite networks are being constantly hacked by outside groups.

While college students are opening their minds, they are also opening themselves to dangerous attacks by hackers. Nine days before finals were to begin, Internet service at Rutgers University was disabled. Students couldn't go online to study, participate

Cyber Attacks at Colleges Impede Free Flow of Knowledge

April 30, 2015 11:19 am | by Ernie Austin, Associate Editor | Articles | Comments

While college students are opening their minds, they are also opening themselves to dangerous attacks by hackers. Nine days before finals were to begin, Internet service at Rutgers University was disabled. Students couldn't go online to study, participate in online classes or register for courses. This attack was the third at Rutger's since November.

A new report adds to the body of evidence, charging that the Russian military is waging a sustained cyber campaign against Ukrainian military and law enforcement agencies, and the purpose is to extract a steady stream of classified documents that can aid

To Aid Combat, Russia Wages Cyber War Against Ukraine, Says Report

April 29, 2015 11:12 am | by Aarti Shahani, NPR | News | Comments

A new report adds to the body of evidence, charging that the Russian military is waging a sustained cyber campaign against Ukrainian military and law enforcement agencies, and the purpose is to extract a steady stream of classified documents that can aid violence and on-the-ground combat.

The final set of servers that Tor uses are called “exit nodes,” because they are the points at which a user’s traffic exits the Tor network and joins the normal web that we use everyday. Rather than being run by one company, most of these exits are set up

The People Who Risk Jail to Maintain the Tor Network

April 29, 2015 10:41 am | by Joseph Cox, Motherboard | News | Comments

The final set of servers that Tor uses are called “exit nodes,” because they are the points at which a user’s traffic exits the Tor network and joins the normal web that we use everyday. Rather than being run by one company, most of these exits are set up by volunteers, or “operators.”

Chinese President Xi Jinping is spearheading a crackdown on the flow of digital information in a campaign that could reshape the cybersecurity relationship between China and the U.S.

US Ensnared in China's Digital Crackdown

April 29, 2015 10:17 am | by Cory Bennett, The Hill | News | Comments

Chinese President Xi Jinping is spearheading a crackdown on the flow of digital information in a campaign that could reshape the cybersecurity relationship between China and the U.S. 

Romanian authorities have detained 25 people who are suspected of being members of an international gang of cyber thieves who hacked into banks, cloned payment cards and used them to steal over $15 million.

Romanian Police Breaks Up Cyber Gang That Stole Over $15M From Banks

April 28, 2015 11:49 am | by Lucian Constantin, CSO Online | News | Comments

Romanian authorities have detained 25 people who are suspected of being members of an international gang of cyber thieves who hacked into banks, cloned payment cards and used them to steal over $15 million.  

Germany's intelligence service, the Bundesnachrichtendienst (BND), has been helping the NSA spy on European politicians and companies for years, according to the German news magazine Der Spiegel.

Spies Like Us: German Intelligence Helps the NSA

April 24, 2015 12:22 pm | by Glyn Moody, Ars Technica | News | Comments

Germany's intelligence service, the Bundesnachrichtendienst (BND), has been helping the NSA spy on European politicians and companies for years, according to the German news magazine Der Spiegel.

A new Pentagon cybersecurity strategy lays out for the first time publicly that the U.S. military plans to use cyber warfare as an option in conflicts with enemies. The 33-page strategy says the Defense Department "should be able to use cyber operations t

New Pentagon Strategy Warns of Cyberwar Capabilities

April 23, 2015 11:00 am | by Lolita C. Baldor, Associated Press | News | Comments

A new Pentagon cybersecurity strategy lays out for the first time publicly that the U.S. military plans to use cyber warfare as an option in conflicts with enemies. The 33-page strategy says the Defense Department "should be able to use cyber operations to disrupt an adversary's command and control networks, military-related critical infrastructure and weapons capabilities."

Chris Roberts knows a lot about hacking planes. But not because he's trying to make them fall out of the sky. In fact, his job as a security researcher is to figure out how bad guys could hack computer systems so that companies can fix them.

Just how hackable is your plane?

April 22, 2015 11:56 am | by Andrea Peterson | Blogs | Comments

Chris Roberts knows a lot about hacking planes. But not because he's trying to make them fall out of the sky. In fact, his job as a security researcher is to figure out how bad guys could hack computer systems so that companies can fix them.

United Airlines stopped a prominent security researcher from boarding a California-bound flight late Saturday, following a social media post by the researcher days earlier suggesting the airline's onboard systems could be hacked.

Researcher Denied Airline Flight After Tweet About Hacking

April 21, 2015 10:24 am | by Jack Gillum, Associated Press | News | Comments

United Airlines stopped a prominent security researcher from boarding a California-bound flight late Saturday, following a social media post by the researcher days earlier suggesting the airline's onboard systems could be hacked.

Advertisement
X
You may login with either your assigned username or your e-mail address.
The password field is case sensitive.
Loading