Digital Forensics

  • Most Topular Stories

  • What does that "look like"?

    Windows Incident Response
    Harlan Carvey
    21 Aug 2014 | 5:43 pm
    We've heard this question a lot, haven't we? I attended a conference about 2 1/2 years ago, and the agenda for that conference had about half a dozen or more presentations that contained "APT" in their title.  I attended several of them, and I have to say...I walked out of some of them.  However, hearing comments from other attendees, many folks felt exactly the same way; not only were they under-whelmed, but I heard several attendees express their disappointment with respect to the content of these presentations.  During one presentation, the speaker stated that the bad guys,…
  • Air Force Leaders Should Read This Book

    TaoSecurity
    Richard Bejtlich
    21 Aug 2014 | 6:56 pm
    I just finished reading The Icarus Syndrome: The Role of Air Power Theory in the Evolution and Fate of the U.S. Air Force by Carl Builder. He published this book in 1994 and I wish I had read it 20 years ago as a new Air Force second lieutenant. Builder makes many interesting points in the book, but in this brief post I'd like to emphasize one of his concluding points: the importance of a mission statement.Builder offers the following when critiquing the Air Force's mission statement, or lack thereof, around the time of his study:[Previous] Air Force of Staff, General John P. McConnell,…
  • Are you really anonymous on the TOR network? Federal Cybersecurity Director Found Guilty on Child Porn Charges

    Ex Forensis
    27 Aug 2014 | 10:13 am
    Federal Cybersecurity Director Found Guilty on Child Porn Charges BY KIM ZETTER WIRED MAGAINZE. "Tor is free software that lets users surf the web anonymously. Using the Tor browser, the traffic of users is encrypted and bounced through a network of computers hosted by volunteers around the world before it arrives at its destination, thus masking the IP address from which the visitor originates
  • Forensic Analysis of Windows Shellbags

    Forensic Focus
    1 Sep 2014 | 6:45 am
    While shellbags have been available since Windows XP, they have only recently become a popular artifact as examiners are beginning to realize their potential value to an investigation. In a nutshell, shellbags help track views, sizes and positions of a folder window when viewed through Windows Explorer; this includes network folders and removable devices. Find out how Shellbags could be important to your digital forensic investigations... Read More (Magnet Forensics)
  • Logging in: They Shall not Pass

    (ISC)2 Blog
    David Harley
    30 Aug 2014 | 9:44 am
    Recently, one of my colleagues forwarded one of those memes currently circulating through social media about the joys of password authentication, with the thought that it might offer a way of mixing advice and humour. In this case, the meme takes the form – slightly exaggerated, but maybe all too close to reality in some cases – of a service user’s attempts to create a password acceptable to the service's authentication mechanism, with the user’s increasing frustration expressed through the increasingly vulgar passwords he tries to create in order to meet…
  • add this feed to my.Alltop

    Windows Incident Response

  • What does that "look like"?

    Harlan Carvey
    21 Aug 2014 | 5:43 pm
    We've heard this question a lot, haven't we? I attended a conference about 2 1/2 years ago, and the agenda for that conference had about half a dozen or more presentations that contained "APT" in their title.  I attended several of them, and I have to say...I walked out of some of them.  However, hearing comments from other attendees, many folks felt exactly the same way; not only were they under-whelmed, but I heard several attendees express their disappointment with respect to the content of these presentations.  During one presentation, the speaker stated that the bad guys,…
  • Book Review: "The Art of Memory Forensics"

    Harlan Carvey
    30 Jul 2014 | 9:42 am
    I recently received a copy of The Art of Memory Forensics (thanks, Jamie!!), with a request that I write a review of the book.  Being a somewhat outspoken proponent of constructive and thoughtful feedback within the DFIR community, I agreed. This is the seminal resource/tome on memory analysis, brought to you by THE top minds in the field.  The book covers Windows, Linux, and Mac memory analysis, and as such must be part of every DFIR analyst's reading and reference list.  The book is 858 pages (not including the ToC, Introduction, and index), and is quite literally packed with…
  • File system ops, testing phase 2

    Harlan Carvey
    24 Jul 2014 | 1:11 pm
    As I mentioned in my previous post on this topic, there were two other tests that I wanted to conduct with respect to file system operations and the effects an analyst might expect to observe within the MFT, and the USN change journal.  My thoughts were that if an intruder were accessing a system via RDP, they might not do the drag-and-drop method to move files, or if they were accessing the system via a RAT and they only had command line access, they might use native, command line tools to conduct file operations.Testing ProtocolAll of the same conditions exist from the previous tests,…
  • File system ops, effects on MFT records

    Harlan Carvey
    22 Jul 2014 | 2:48 pm
    I recently conducted some testing of different actions on a Windows 7 system, with the specific purpose of identifying artifacts within the file system (in this case, the MFT and the USN change journal), particularly within individual records.  I wanted to take a look at the effects of different actions to see what they "look like" within the individual records, as well as within the USN change journal, in hopes that things would pop out that could be used during forensic exams.  Once I completed my testing, I decided to share what I'd done and what I'd found, in hopes that others…
  • Random Stuff

    Harlan Carvey
    10 Jul 2014 | 5:28 am
    Host-Based Digital AnalysisThere are a lot of folks with different skill sets and specialties involved in targeted threat analysis and threat intel collection and dissemination.  There are a lot of researchers with specific skill sets in network traffic analysis, malware reverse engineering, etc.One of the benefits I find in host-based analysis is that the disk is one of the least volatile of the data sources.  Ever been asked to answer the "what data left our organization" definitively?  Most often, the answer to that question is, if you didn't conduct full packet capture when…
 
  • add this feed to my.Alltop

    TaoSecurity

  • Air Force Leaders Should Read This Book

    Richard Bejtlich
    21 Aug 2014 | 6:56 pm
    I just finished reading The Icarus Syndrome: The Role of Air Power Theory in the Evolution and Fate of the U.S. Air Force by Carl Builder. He published this book in 1994 and I wish I had read it 20 years ago as a new Air Force second lieutenant. Builder makes many interesting points in the book, but in this brief post I'd like to emphasize one of his concluding points: the importance of a mission statement.Builder offers the following when critiquing the Air Force's mission statement, or lack thereof, around the time of his study:[Previous] Air Force of Staff, General John P. McConnell,…
  • On the Twenty Years Since My USAFA Graduation

    Richard Bejtlich
    1 Jun 2014 | 4:00 pm
    Twenty years ago today, on 1 June 1994, 1024 of us graduated from the United States Air Force Academy, commissioned as brand new second lieutenants. As of September 2012, over 600 members of the class of 1994 were still in uniform. I expect that number is roughly the same today. Reaching the 20 year mark entitles my classmates still in uniform to retire with lifetime benefits, should they choose to do so. I expect some will, but based on patterns from earlier classes I do not expect a massive exodus. The economy is still in rough shape, and transitioning from the military to the private…
  • Video of Bejtlich at Cyber Crime Conference 2014

    Richard Bejtlich
    14 May 2014 | 9:07 am
    On Tuesday the 29th of April I delivered a keynote at the US Cyber Crime Conference in Leesburg, VA.The video is online although getting to it is more complicated than clicking on a link to YouTube.Here's what I did to access the video.First, visit this link for a "SabreCity" account. Fill in your "information" and click Register.You will then see a rude message saying "Registration for this conference is now closed."That's no problem. From the same browser now visit this link to go to the SabreCity "lobby."Click the "On Demand" button on the right side of the screen. Now you can access all…
  • Brainwashed by The Cult of the Quick

    Richard Bejtlich
    3 May 2014 | 5:59 pm
    Faster is better! Those of us with military backgrounds learned that speed is a "weapon" unto itself, a factor which is "inherently decisive" in military conflict. The benefit of speed was so ingrained into my Air Force training that I didn't recognize I had been brainwashed by what Dr. Thomas Hughes rightly identified as The Cult of the Quick.Dr. Hughes published his article of this title in the Winter 2001 issue of the Aerospace Power Journal. His main point is the following:At a time when the American military has global commitments arrayed at variable threats, both real and potential, the…
  • Five Thoughts on New China Article

    Richard Bejtlich
    24 Apr 2014 | 6:47 am
    I just read a thoughtful article by Michael O'Hanlon and James Steinberg, posted at Brookings and Foreign Policy titled Don't Be a Menace to South (China Sea).It addresses thorny questions regarding China as President Obama visits South Korea, Japan, Malaysia, and the Philippines.I wanted to share five quick thoughts on the article, fully appreciating I don't have all the answers to this complex strategic problem.1. "Many in China see the U.S. rebalance as ill-disguised containment, while many in the United States see Chinese military modernization and territorial assertiveness as…
  • add this feed to my.Alltop

    Ex Forensis

  • Are you really anonymous on the TOR network? Federal Cybersecurity Director Found Guilty on Child Porn Charges

    27 Aug 2014 | 10:13 am
    Federal Cybersecurity Director Found Guilty on Child Porn Charges BY KIM ZETTER WIRED MAGAINZE. "Tor is free software that lets users surf the web anonymously. Using the Tor browser, the traffic of users is encrypted and bounced through a network of computers hosted by volunteers around the world before it arrives at its destination, thus masking the IP address from which the visitor originates
  • Computer investigator pleads guilty to misrepresenting credentials

    7 Feb 2014 | 11:11 am
    http://www.concordmonitor.com/home/10505029-95/computer-investigator-pleads-guilty-to-misrepresenting-credentials " A Rye private investigator who has received $23,000 from the state since 2006 to do computer forensic investigations for indigent defendants pleaded guilty last week to misrepresenting some of her investigative certifications on her company’s website. Judith Gosselin, owner and
  • Anal probes? A new kind of abduction scenario that started with clinched butt cheeks.

    6 Nov 2013 | 6:56 am
    Forget about aliens and UFOs.  Instead of watching the sky, apparently we need to be watching the police. "The incident began January 2, 2013 after David Eckert finished shopping at the Wal-Mart in Deming.  According to a federal lawsuit, Eckert didn't make a complete stop at a stop sign coming out of the parking lot and was immediately stopped by law enforcement.     Eckert's attorney,
  • Is Your GPS Bracelet Listening?

    28 Oct 2013 | 11:30 am
    Here is an article from The Crime Report about some GPS bracelets that have a cellular telephone capability built into the bracelet. The implications are interesting, to say the least. Caution: Your GPS Ankle Bracelet Is Listening Thanks to Sarah R. Olson at the NC Indigent Services for sharing this link with me.
  • Computer Forensics Job Opening

    22 Oct 2013 | 10:55 am
    The Baltimore Police Department has an opening for a Computer Forensics examiner. The link to the post is here: Computer Forensic Examiner Opening Job Title:Computer Forensic Examiner I Closing Date/Time:Fri. 11/08/13 4:30 PM Eastern Time Salary:$25.07 - $31.23 Hourly $45,630.00 - $56,836.00 Annually Job Type:MERIT Location:Towson, Maryland
 
  • add this feed to my.Alltop

    Forensic Focus

  • Forensic Analysis of Windows Shellbags

    1 Sep 2014 | 6:45 am
    While shellbags have been available since Windows XP, they have only recently become a popular artifact as examiners are beginning to realize their potential value to an investigation. In a nutshell, shellbags help track views, sizes and positions of a folder window when viewed through Windows Explorer; this includes network folders and removable devices. Find out how Shellbags could be important to your digital forensic investigations... Read More (Magnet Forensics)
  • Curious about Nuix Web Review and Analytics? Join Nuix's expert webinar series

    29 Aug 2014 | 2:31 am
    In June this year, Nuix launched Nuix Web Review and Analytics, a powerful web application that makes evidence securely and conveniently available using any modern web browser. This enables organizations to provide secure and compartmentalized access to case data for multiple reviewers, investigators, lawyers, subject matter experts and external parties. See Nuix Web Review and Analytics for yourself by joining one or both of the upcoming free, expert webinars. Learn how to; • Process, search and review evidence in a single workflow without converting or transferring data between tools •…
  • Paraben Announces the Device Seizure Challenge

    28 Aug 2014 | 11:58 am
    How long has it been since you've tried Device Seizure? With over 12 years of development exclusively as a forensic tool, the latest version of Device Seizure goes head-to-head with any tool available. We know you will love the new Device Seizure and are willing to give you a free 30 day license so you can find out how much Device Seizure v6.66 can do for you. Visit the Paraben website for additional details on the challenge at www.paraben.com/challenge.php
  • Why Offender Profiling is Changing Thanks to Mobile Forensics

    28 Aug 2014 | 7:26 am
    Mobile forensics has changed the methodology when it comes to offender profiling. The frequent use of mobile devices has provided investigators with another source for profiling criminal suspects, as well as an insight into their habits and personalities. This is not just because of the volume of user voice calls and SMS texts; the amount of rich data that can be extracted from Instant Messaging (IM) and social media applications gives forensic investigators the paint and brushes to develop a detailed picture of a suspect and a criminal case. A suspect’s social media personality can offer a…
  • Why Are Prefetch Files Important to Your Digital Forensics Investigations?

    25 Aug 2014 | 12:54 am
    Prefetch files are great artifacts for forensic investigators trying to analyze applications that have been run on a system. Windows creates a prefetch file when an application is run from a particular location for the very first time. This is used to help speed up the loading of applications. For investigators, these files contain some valuable data on a user’s application history on a computer. Learn why prefetch files are important to your digital forensics investigation... Read More (Magnet Forensics)
  • add this feed to my.Alltop

    (ISC)2 Blog

  • Logging in: They Shall not Pass

    David Harley
    30 Aug 2014 | 9:44 am
    Recently, one of my colleagues forwarded one of those memes currently circulating through social media about the joys of password authentication, with the thought that it might offer a way of mixing advice and humour. In this case, the meme takes the form – slightly exaggerated, but maybe all too close to reality in some cases – of a service user’s attempts to create a password acceptable to the service's authentication mechanism, with the user’s increasing frustration expressed through the increasingly vulgar passwords he tries to create in order to meet…
  • JP Morgan Chase Security Breach Comments from (ISC)² Leadership

    (ISC)² Management
    28 Aug 2014 | 1:29 pm
    Continuous monitoring is the key to thwarting these types of breaches. With cyberattacks becoming commonplace in every sector, companies must continuously protect their most valuable information. Cyber guns fire at us all the time, but the notion of catching and stopping every cybercriminal simply isn’t realistic in today’s burgeoning threat environment. I liken it to aspiring to completely eliminate common street crime. It’s just not realistic. Flaws will always exist, even within the most ideal protective structures. Every company should assume they’ll be breached, and focus efforts…
  • What Will Ease Healthcare's Heartburn Over 'Heartbleed'?

    Dan Waddell
    22 Aug 2014 | 2:00 pm
    One of the latest breaches to hit the news took place at Community Health Systems (CHS), affecting an estimated 4.5 million patients.  According to principal security consultant and founder of TrustedSec, David Kennedy, the initial attack vector was through the infamous OpenSSL “heartbleed” vulnerability that led to the compromise of the information.  What is especially noteworthy about this particular attack is its impact on the healthcare community.  Major data breaches such as the one at Target last year put the spotlight on how retailers need to do a better job at…
  • Introducing the Automotive Industry to Information Security: I Am The Cavalry Steers Call to Action

    Hord Tipton
    22 Aug 2014 | 6:41 am
    The Internet of Things (IoT) is already affecting nearly all aspects of life, and it’s just getting started. Some of the most promising IoT applications occur in the auto industry, but as technological innovation outpaces security, millions of Americans’ physical safety is put at risk. Cars can already parallel park themselves, steer you back into your lane if you start drifting, and automatically slow down if you get too close to the vehicle in front of you. More and more cars are being controlled by computers, not humans. It’s not hard to envision cars of the near-future with the…
  • Why we continue to fail on cyber security

    Sorin Mustaca
    30 Jul 2014 | 6:26 am
    I've been asked a lot of times, especially when I was working for an antivirus producer, why can't we simply write a software that always protects the users. Well, there is a short answer and a long answer. Short answer: Because 100% security does not exist and because most people are hackable due to being ignorant on what security is (of course, until he/she is hacked first time, and sometimes not even after such an event). Long answer, which I massively shortened by not touching all areas and not going into details: The reason is the ignorance about everything that might…
 
  • add this feed to my.Alltop

    Computer Forensics, Malware Analysis & Digital Investigations

  • EnCase v7 EnScript to find files based on MD5 hash values

    18 Aug 2014 | 5:02 pm
    I had written a version of this years ago for EnCase v6 and I was recently asked to update it for EnCase v7.One EnScript listed below will generate a text files of SELECTED files. That text file can then be used on subsequent cases to help find/identify files with the same hash value.To use, you do not need to generate hash values, the EnScript will do it automatically. The second EnScript is also optimized to first match file sizes first before generating/comparing hash values to help reduce the time needed for the comparison, thus saving the need to hash everything in the…
  • EnCase v7 EnScript to quickly provide MD5/SHA1 hash values and entropy of selected files

    10 Apr 2014 | 9:22 pm
    I recently had the need to quickly triage and hash several specific files within a case, but I did not want to (or possibly could not) run the "process evidence" option to generate hash values for *all* files.EnCase v7 has the ability to generate hash values of selected files through the right-click context menu->Entries->Hash/Sig Selected files.The downside to this option is that it requires you to close the "evidence" tab and then reopen it, causing you to lose your place/highlighted file.So I wanted a way to quickly generate the MD5 & SHA1 hash so that I could…
  • EnCase EnScript to show file summary of user's profile by extension

    20 Mar 2014 | 10:33 pm
    This is another "quick hit" EnScript to generate a quick report on the types of files under a user's profile based on file extensions. The EnScript will automatically create an Excel spreadsheet, with a sheet for each user, showing the total number of files for each extension and the total number of bytes for each extension, percentage for each extension and total bytes for each summary. Folders and files with zero logical size are ignored:Download EnCase v6 EnScript Here
  • EnCase EnScript to parse each NTUSER.DAT for RecentDocs

    19 Mar 2014 | 9:20 pm
    This EnScript is another "quick hit" to parse out all the recently accessed files recorded in the user's NTUSER.DAT.HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\RecentDocsWhen run, it will parse each NTUSER.DAT and display the results in console, as well as automatically open Excel (Excel is required to be installed on the examiner's machine in order to use this EnScript) and create a worksheet for each user processed:The EnScript will also create a bookmark for each user. It will put the date the registry key was last modified in the comment section of each…
  • EnCase EnScript to parse & display recent RDP sessions from user's NTUSER.DAT

    19 Mar 2014 | 10:20 am
    This EnScript was designed as a "quick hit" to parse and show the MRU values for the Terminal server client for each user.The EnScript checks the Software\Microsoft\Terminal Server Client\Default for each NTUSER.DAT and displays/bookmarks any values.*The link below has been updated to an EnScript that can be run in either v6 & v7.Download EnCase v6 & v7 here
  • add this feed to my.Alltop

    viaForensics

  • Katie Strzempka’s Top 5 Security Issues in Mobile Applications

    Linnea
    28 Aug 2014 | 11:37 am
    Next Tuesday, September 2, Katie Strzempka (@kstrzemp), Director of Mobile Services will host a viaTalk at 1pm CDT. For the first half, she will discuss her experience testing mobile apps over the past five years, and mention some of the most common flaws that she has found in everyday apps. In the second half, there will be a question & answer section where the audience is encouraged to participate. Register How do we determine most common vulnerabilities? Katie’s team worked on the first generalized testing to obtain high-level results from the 100 most popular apps from the…
  • viaForensics named Inc 5000 Fastest Growing Company

    KevinS
    25 Aug 2014 | 8:23 am
    We’re pleased to announce that viaForensics has been named to the 2014 Inc. 5000, a list of the 5000 fastest growing private companies in America. This is the 33rd year Inc. Magazine has compiled the list. Previous companies named to the Inc. 5000 include Microsoft, Timberland, Vizio, Intuit, Chobani, Oracle and Zappos.com. This year viaForensics was ranked #760 of the fastest growing companies in America, with 2013 revenues topping $3.1 million and a three-year growth rate of 600%. We are also excited to have been named to Inc.’s list of the Top 20 Security companies in 2014.
  • viaForensics Awarded Prestigious SBIR Phase III Contract

    KevinS
    20 Aug 2014 | 12:47 pm
    FOR IMMEDIATE RELEASE For more information contact: Ethan Rasiel Lightspeed PR ethan@lightspeedpr.com 917-770-9435 VIAFORENSICS AWARDED PRESTIGIOUS SBIR PHASE III CONTRACT Small Business Innovation Research Contract from U.S. Gov’t Recognizes viaForensics’ Contributions to Mobile Forensics OAK PARK, ILL, August 20, 2014– viaForensics, which helps enterprises and consumers keep mobile data secure and private, is proud to announce that it is the recipient of a Small Business Innovation Research (SBIR) Phase III contract from the Department of Homeland Security (DHS) Science &…
  • Webinar: The Benefits of Jailbreaking iOS Devices

    Linnea
    13 Aug 2014 | 3:04 pm
    The Benefits of Jailbreaking iOS Devices Next Tuesday, August 19, Katie Strzempka (@kstrzemp) Director of Mobile Services is hosting a viaTalk at 1pm CDT. The webinar will discuss the benefits of jailbreaking, a method that allows a user extra privileges on his or her device in order to access more information. Register Why jailbreak? Jailbreaking is a method that is used to get escalated privileges on iOS devices (similar to rooting on Android). The additional privileges allow deeper analysis of both the device and its applications, and increases the possibilities for data recovery.
  • Terence Fernandes hosts #viaTalks

    Linnea
    6 Aug 2014 | 2:57 pm
    How to Complete Free App Security Assessments with viaLab CE Terence Fernandes, mobile security engineer at viaForensics, will be hosting a viaTalk on August 12 at 1pm CDT. He will discuss the features of the new viaLab Community Edition (CE) product to be released shortly. This webinar will show you how to quickly test the security of most applications on Android and iOS Register What is viaLab CE? viaLab CE is the free version of our viaLab enterprise software which does automated testing of mobile applications. Terence will do a live demonstration of viaLab and detail each of the…
  • add this feed to my.Alltop

    Crime Museum » Blog

  • Profiles in Crime: Rayful Edmond

    crimemuseum
    22 Aug 2014 | 5:05 pm
    Rayful Edmond: The profile of a Kingpin. Called the John Gotti of Washington, D.C., notorious gangster Rayful Edmond terrorized and awed the Washington metropolitan area in the mid to late 1980’s with his tight control of the crack cocaine trade and accompanying lavish spending sprees. Known for dropping several thousand dollars a night at clubs, Edmond supposedly spent over $400,000 at a single store in the Georgetown neighborhood, whose owner was, coincidentally, convicted of money laundering soon after. Partially thanks to Edmond’s reign as drug lord, Washington, D.C. became known as…
  • 9 Early Warning Signs for Serial Killers

    crimemuseum
    23 Jun 2014 | 3:07 am
    9 Early Warning Signs for Serial Killers. Worried that antisocial kid in school might grow up to be a cold-blooded murderer? Here’s 9 early warning signs for serial killers. Remember, however, these traits and signs are just a guideline. Think twice before crying “serial killer” on your weird neighbor. Ed Gein circa 1957 1. Antisocial Behavior Psychopaths have a strong tendency towards antisocial behavior, so watch for extremely antisocial children. That being said, some children develop more slowly, and this is not a definitive sign. Pay attention if a child regresses from being…
  • Murder?

    wilson.dejesus
    23 Jun 2014 | 3:00 am
    Murder? Sir William Blackstone, an 18th century English judge, is known for writing Commentaries on the Laws of England. This work was the original foundation for legal education in America and dominated the common law legal system for centuries. Blackstone broke the definition of murder down into five elements: 1. Unlawful 2. killing 3. of a human 4. by another human 5. with malice aforethought. The law was designed to define the various degrees and circumstances of murder in order to provide and achieve justice for all. Even though Blackstone did his best to dissect and define murder, in…
  • Do You Have Your Father’s Nose?

    crimemuseum
    20 May 2014 | 2:44 am
    Do you have your father’s nose? There are 29 bones (hyoid included) in the human skull, and for many years anthropologists have been using markers from this area of the body to determine sex, age, race, and to make personal identifications. However, forensic anthropology is a science that is greatly affected by changes and new developments in social morays and folkways. Simply put, what was once socially unacceptable often becomes acceptable, and even encouraged, with time. This fact is abundantly clear when one thinks about the checkered history of the United States. While being a…
  • Pro Se: Representing Yourself in Court

    crimemuseum
    8 May 2014 | 5:00 am
    Pro Se is a legal term that comes from Latin, meaning ‘for oneself’. It essentially means that you are representing yourself in court by choice without the help of an attorney. In the United States’ legal system, every individual is guaranteed, by the sixth amendment, the right to an appointed counsel, and also the right to represent him or herself in court. People may choose to represent themselves in court for a variety of reasons, including: avoiding the expense of hiring a lawyer, for smaller cases, the matter is often simple enough that the individual can take care of it them…
 
  • add this feed to my.Alltop

    DFI News All

  • Heartbleed Risk Continues as Servers Remain Unpatched

    eaustin
    28 Aug 2014 | 1:51 pm
    Within four days of the first public reports of a major flaw in OpenSSL's software for securing communications on the Internet, mass attacks searched for and targeted vulnerable servers.Read more about Heartbleed Risk Continues as Servers Remain UnpatchedComments
  • Mobile Forensics is Changing Offender Profiling

    eaustin
    28 Aug 2014 | 1:39 pm
    Mobile forensics has changed the methodology when it comes to offender profiling.  The frequent use of mobile devices has provided investigators with another source for profiling criminal suspects, as well as an insight into their habits and personalities.  Read more about Mobile Forensics is Changing Offender ProfilingComments
  • Agency Incident Response Rate

    eaustin
    28 Aug 2014 | 1:21 pm
    As in any job, in cybersecurity it’s the paperwork that gets you. In a recent study, the Government Accountability Office found that agencies are doing an incomplete job in documenting their response to security incidents.Read more about Agency Incident Response RateComments
  • Massive Cyber Attack on Oil and Energy Industry in Norway

    eaustin
    28 Aug 2014 | 1:12 pm
    As many as 300 oil and energy companies have been targeted by hackers in the largest ever coordinated cyber attack in Norway. The Local reports that 50 companies in the oil sector have already been breached while another 250 are at risk.Read more about Massive Cyber Attack on Oil and Energy Industry in NorwayComments
  • Windows XP-heavy Turkey Overrun with GoZ Infections

    eaustin
    28 Aug 2014 | 1:04 pm
    In the context of cyber crime, emerging countries such as Brazil, South Korea and Turkey among many others are in the crosshairs because of a number of factors, including a prevalence of outdated and unpatched computers and lower levels of security awareness within the general population. Turkey is one country feeling the wrath more than most in Europe. A study published by CSIS of Denmark shows that country is overrun with banking malware infections, in particular GameOver Zeus and Sality.Read more about Windows XP-heavy Turkey Overrun with GoZ InfectionsComments
  • add this feed to my.Alltop

    Secure Hunter Anti-Malware » Secure Hunter Blog

  • CryptoWall’s Haul: $1M in Six Months Secure Hunter

    shadmin
    30 Aug 2014 | 5:55 am
    The CryptoWall ransomware has proven to be a profitable criminal enterprise, netting more than $ 1.1 million in six months. More than 1,600 victims have surfaced and more than 5 billion files have been encrypted. Threatpost – English – Global – threatpost.com » Malware Secure Hunter Anti -Malware The post CryptoWall’s Haul: $1M in Six Months Secure Hunter appeared first on Secure Hunter Anti-Malware.
  • Backoff Sinkhole Reveals Sorry Point-of-Sale Security Secure Hunter

    shadmin
    29 Aug 2014 | 5:52 pm
    A new analysis of sinkholes Backoff point-of-sale malware paints a bleak picture of the state of point-of-sale security. Threatpost – English – Global – threatpost.com » Malware Secure Hunter Anti -Malware The post Backoff Sinkhole Reveals Sorry Point-of-Sale Security Secure Hunter appeared first on Secure Hunter Anti-Malware.
  • Windows XP-Heavy Turkey Overrun with GameOver Zeus Infections Secure Hunter

    shadmin
    28 Aug 2014 | 5:56 am
    GameOver Zeus and Sality banking malware infections are rampant in emerging countries such as Turkey where older, unpatched computers are prevalent, and security awareness is low. Threatpost – English – Global – threatpost.com » Malware Secure Hunter Anti -Malware The post Windows XP-Heavy Turkey Overrun with GameOver Zeus Infections Secure Hunter appeared first on Secure Hunter Anti-Malware.
  • Java.com, TMZ Serving Malvertising Redirects to Angler Exploit Kit Secure Hunter

    shadmin
    27 Aug 2014 | 5:51 pm
    Popular websites TMZ and Java.com are among a handful serving malicious ads redirecting visitors to the Angler Exploit Kit. Threatpost – English – Global – threatpost.com » Malware Secure Hunter Anti -Malware The post Java.com, TMZ Serving Malvertising Redirects to Angler Exploit Kit Secure Hunter appeared first on Secure Hunter Anti-Malware.
  • AdThief iOS Malware Affecting 75K Jailbroken Devices Secure Hunter

    shadmin
    26 Aug 2014 | 5:53 am
    A relatively new form of malware on iOS is estimated to have stolen revenue from 22 million ads and infected upwards to 75,000 devices so far. Threatpost – English – Global – threatpost.com » Malware Secure Hunter Anti -Malware The post AdThief iOS Malware Affecting 75K Jailbroken Devices Secure Hunter appeared first on Secure Hunter Anti-Malware.
Log in