Digital Forensics

  • Most Topular Stories

  • "DFIRCON East Advanced Smartphone Forensics Challenge Winner Announced!"

    SANS Digital Forensics and Incident Response Blog
    hmahalik
    8 Oct 2014 | 4:08 am
    Due to the vast amount of responses we got for our Smartphone Forensic Challenge, the winner was just determined. The rules states that the winner must answer 4 of the 6 questions correctly, and the lucky winner answered all 6 questions correctly. Shawna Denson, you are the lucky winner!!!!Thank you to everyone who submitted. FOR585 Advanced Smartphone Forensics is currently being held online virtual training via onDemand, at Network Security 2014 (Las Vegas), and
  • WRF 2/e Contest

    Windows Incident Response
    Harlan Carvey
    23 Oct 2014 | 5:57 am
    I recently posted that Syngress has agreed to publish a second edition of Windows Registry Forensics, and in that post, I mentioned that I wanted to provide those in the community with an opportunity to have input into the content of the book prior to it being published.  I know that it's only been a couple of days since the post was published, but historically, requests like these haven't really panned out.  As such, I wanted to take something of a different approach...at the recommendation of a friend, and stealing a page from the Volatility folks, I'm starting a contest for…
  • Monroe County detective certified in computer forensics - PoconoNews.net

    digital forensics - Google News
    30 Oct 2014 | 4:52 am
    Monroe County detective certified in computer forensicsPoconoNews.netSTROUDSBURG - Detective Brian Webbe of the Monroe County District Attorney's Office has completed the required coursework and has been awarded the certification of Certified Forensic Computer Examiner by the International Association of Computer ...
  • Shellshock Exploitation: Using BeEF Framework

    Checkmate
    Nilesh Sapariya
    28 Oct 2014 | 3:14 am
    In a previous article, we have described the Shellshock vulnerability and in this article we show how to exploit this vulnerability using the BeEF Framework. However, here’s a quick and dirty way to check if you’re vulnerable or not: Type this command:env x='() { :;}; echo vulnerable’ bash -c “echo this is a test” Note: Read More... The post Shellshock Exploitation: Using BeEF Framework appeared first on Checkmate.
  • UK FSR Digital forensics method validation: draft guidance

    Forensic Focus
    29 Oct 2014 | 5:37 am
    "The UK Forensic Science Regulator has issued the linked document for consultation. https://www.gov.uk/government/consultations/digital-forensics-method-validation-draft-guidance For UK practitioners, big or small, the implications are considerable. If you don't agree with what is proposed you need to respond by the end the month. FWIW I think UK practitioners are sleep walking into a bureaucratic disaster in the years ahead..." Read More (forum post)
  • add this feed to my.Alltop

    SANS Digital Forensics and Incident Response Blog

  • "DFIRCON East Advanced Smartphone Forensics Challenge Winner Announced!"

    hmahalik
    8 Oct 2014 | 4:08 am
    Due to the vast amount of responses we got for our Smartphone Forensic Challenge, the winner was just determined. The rules states that the winner must answer 4 of the 6 questions correctly, and the lucky winner answered all 6 questions correctly. Shawna Denson, you are the lucky winner!!!!Thank you to everyone who submitted. FOR585 Advanced Smartphone Forensics is currently being held online virtual training via onDemand, at Network Security 2014 (Las Vegas), and
  • "Announcing the GIAC Network Forensic Analyst Certification - GNFA"

    SANS Institute
    6 Oct 2014 | 11:07 pm
    A new security certification focused on the challenging field of network forensicsBETHESDA, MD - October 7, 2014- Global Information Assurance Certification (GIAC) is pleased to announce a new forensics certification, the GIAC Network Forensic Analyst (GNFA). The GNFA validates that professionals who hold this credential are qualified to perform examinations employing network forensic artifact analysis and demonstrate an understanding of the fundamentals of network forensics, normal and abnormal conditions for common network protocols, the process and tools used to examine device and system…
  • "SANS Cyber Threat Intelligence Summit - Call For Papers Now Open"

    SANS Institute
    1 Oct 2014 | 1:56 am
    SANS Cyber Threat Intelligence Summit Call For Papers 2015.Send your submissions to CTISummit@sans.org by 5 pm EST on Friday, October 24, 2014 with the subject"SANS CTI Summit CFP 2015."Dates: Summit Dates: February 2 & 3, 2015Pre?Summit Course Dates: February 4?9, 2015Location:Washington, DC Our 3rd annual Cyber Threat Intelligence (CTI) Summit will once again be held in Washington DC.Summit Co-Chairs:Mike Cloppert and Rick HollandThe goal of this summit will be to equip attendees with knowledge on the tools, methodologies and processes they need to move forward…
  • "TorrentLocker Unlocked"

    sansforensics
    8 Sep 2014 | 9:57 pm
    Guest submission byTaneli Kaivola, Patrik Nisn and Antti Nuopponen of NIXUTorrentLocker is a new breed of ransomware that has been spreading lately. Like CryptoLocker and CryptoWall it encrypts files on a victim's machine and then demands ransom. The victim has to pay to get the decryption software that can decrypt the files.On a recent incident response case we came across a malware program that had all the known characteristics of TorrentLocker. We started to analyze the malware to see if there was a way to get the files decrypted without paying the ransom. It is well known that some…
  • "Super Sunday Funday Forensic Challenge"

    SANS Institute
    4 Sep 2014 | 1:40 am
    The Challenge: Starting September 4, 2014 on the Hacking Exposed Computer Forensics Blog the first forensicimage will be available for download. Your goal is to solve the questionwith the first forensic image and email it to dcowen@g-cpartners.com.The Challenge:The first forensic image is available for download. Your goal is to solve the question with the first forensic image located at:https://mega.co.nz/#!qoxgGYCY!1jM32pncF0wE-TROhaXFI07hZbu5AfZ1BJE-p8tm1moand email the answer to the following questionsto:dcowen@g-cpartners.com.What was used to wipe this drive?What special options were…
 
  • add this feed to my.Alltop

    Windows Incident Response

  • WRF 2/e Contest

    Harlan Carvey
    23 Oct 2014 | 5:57 am
    I recently posted that Syngress has agreed to publish a second edition of Windows Registry Forensics, and in that post, I mentioned that I wanted to provide those in the community with an opportunity to have input into the content of the book prior to it being published.  I know that it's only been a couple of days since the post was published, but historically, requests like these haven't really panned out.  As such, I wanted to take something of a different approach...at the recommendation of a friend, and stealing a page from the Volatility folks, I'm starting a contest for…
  • RegRipper v2.8 is now on GitHub

    Harlan Carvey
    22 Oct 2014 | 12:53 pm
    RegRipper v2.8 is now available on GitHub.From this point forward, this repository should be considered THE repository for RegRipper version 2.8.  If you want a copy of RegRipper, just click the "Download ZIP" button on the right of the browser window, and save the file...doing so, you'll have the latest-and-greatest set of plugins available. If you have any questions, please feel free to contact me.
  • Windows Event Logs

    Harlan Carvey
    21 Oct 2014 | 4:31 am
    Dan recently tweeted:Most complete forensics-focused Event Log write-ups? DFIRI have no idea what that means.  I'm going to assume that what Dan's looking for is information regarding Event Logs records that have been found useful or valuable to forensic analysts, or potentially could be.EVT vs EVTXWindows XP is no longer supported by Microsoft, but there are still XP and 2003 systems out there, and as such, some of us are still going to need to know the difference between Event Logs (XP, 2003), and Windows Event Logs (Vista+). Besides the binary differences in the records and Event Log…
  • Publishing DFIR Books

    Harlan Carvey
    20 Oct 2014 | 5:45 pm
    I recently received notification that Syngress is interesting in publishing a second edition of Windows Registry Forensics.  I submitted my proposed outline, the reviews of which were apparently favorable enough to warrant a second edition. I've blogged before regarding writing DFIR books, and that effort seems to have fizzed a bit.  I wanted to take the opportunity to give another shot and see if I couldn't resurrect this topic, or a portion of it, just a bit.  So, the purpose of this blog post is two-fold: to set expectations of the upcoming edition, as well as offer…
  • Stuff

    Harlan Carvey
    6 Oct 2014 | 6:17 am
    IRHere's a really good...no, I take that back...a great blog post by Sean Mason on "IR muscle memory".  Take the time to give it a read, it'll be worth it, for no other reason than because it's valuable advice.  Incident response cannot be something that you talk about once and never actually do; it needs to be part of muscle memory.  Can you detect an incident, and if so, how does your organization react?  Or, if you receive an external notification of a security incident, how does your organization respond?A couple of quotes from the blog post that I found interesting…
  • add this feed to my.Alltop

    digital forensics - Google News

  • Monroe County detective certified in computer forensics - PoconoNews.net

    30 Oct 2014 | 4:52 am
    Monroe County detective certified in computer forensicsPoconoNews.netSTROUDSBURG - Detective Brian Webbe of the Monroe County District Attorney's Office has completed the required coursework and has been awarded the certification of Certified Forensic Computer Examiner by the International Association of Computer ...
  • Ex-Pennsylvania State Police trooper new head of Lehigh County digital ... - The Express-Times - lehighvalleylive.com

    24 Oct 2014 | 1:52 pm
    Ex-Pennsylvania State Police trooper new head of Lehigh County digital The Express-Times - lehighvalleylive.comdesales lab View full sizeDeSales University professor Joseph Pochron, standing, works with graduate student Jon Langton in the David M. Petzold Digital Forensics Laboratory at DeSales. A former Pennsylvania State Police detective has been named the ...
  • Dixie State University boasts top notch digital forensics crime lab - Good4Utah

    22 Oct 2014 | 8:20 pm
    Dixie State University boasts top notch digital forensics crime labGood4UtahST. GEORGE, Utah (ABC 4 Utah) - Cell phones are quickly becoming a criminal's weapon of choice. Detective Donnie Hovis is a forensic examiner St. Louis, Mo. He and other officers from around the world were in Southern Utah for special training at Dixie ...and more »
  • FAA seeks commercial app to help manage and preserve digital forensic evidence - FierceGovernmentIT

    22 Oct 2014 | 8:31 am
    FAA seeks commercial app to help manage and preserve digital forensic evidenceFierceGovernmentITIn an Oct. 15 posting on the FedBizOps website, the FAA said it's seeking a commercial off-the-shelf application that will create a remotely accessible depository where digital media analysts can store digital forensic evidence and distribute forensic FAA seeks digital tool to aid investigationsFCW.com (blog)all 3 news articles »
  • Life Lessons: Digital forensics - WFMZ Allentown

    13 Oct 2014 | 2:13 am
    WFMZ AllentownLife Lessons: Digital forensicsWFMZ AllentownThat's why Desales started a new digital forensics track this fall in its undergraduate criminal justice major. It's basically gathering and analyzing digital evidence for use in court. "I think digital forensics is an important field because it
 
  • add this feed to my.Alltop

    Checkmate

  • Shellshock Exploitation: Using BeEF Framework

    Nilesh Sapariya
    28 Oct 2014 | 3:14 am
    In a previous article, we have described the Shellshock vulnerability and in this article we show how to exploit this vulnerability using the BeEF Framework. However, here’s a quick and dirty way to check if you’re vulnerable or not: Type this command:env x='() { :;}; echo vulnerable’ bash -c “echo this is a test” Note: Read More... The post Shellshock Exploitation: Using BeEF Framework appeared first on Checkmate.
  • POODLE Advisory

    Alex Rajan
    20 Oct 2014 | 1:30 am
    What is POODLE? POODLE stands for Padding Oracle On Downgraded Legacy Encryption Vulnerability CVE: CVE-2014-3566 What is the attack? The attack occurs when an attacker is able to downgrade the client to use SSLv3. By simulating a failure during the negotiation process, an attacker can force a browser and a server to renegotiate using an Read More... The post POODLE Advisory appeared first on Checkmate.
  • Mitigating the Remote Code Execution in Bash

    Rajesh Deo
    6 Oct 2014 | 3:28 am
    Introduction In the last post we saw how the recent bash vulnerability can be remotely exploited in a variety of ways. How do we defend against this? Below we discuss steps that will help your organization identify vulnerable components and initiate mitigation activities. Steps to identify, test and mitigate vulnerable systems   Make an inventory Read More... The post Mitigating the Remote Code Execution in Bash appeared first on Checkmate.
  • Bourne Again Shell (Bash) Remote Code Execution Vulnerability

    Rajesh Deo
    26 Sep 2014 | 2:35 am
    Introduction A remotely exploitable vulnerability was discovered by Stephane Chazelas of Akamai in the GNU Bash command shell. The vulnerability has been assigned the CVE identifier CVE-2014-6271. Exploitation of this vulnerability may allow a remote attacker to execute arbitrary code on an affected system. The issue affects all UNIX and UNIX-like systems such as Linux Read More... The post Bourne Again Shell (Bash) Remote Code Execution Vulnerability appeared first on Checkmate.
  • ATM Application Whitelisting Security Assessment

    Wasim Halani
    22 Sep 2014 | 1:10 am
    During a recent engagement, we were asked to test the security level of an application white-listing solution deployed on the Windows XP ATMs of one of the largest ATM manufacturers in the world. The reason such solutions are in vogue is that Windows XP is no longer supported by Microsoft and no security patches are Read More... The post ATM Application Whitelisting Security Assessment appeared first on Checkmate.
  • add this feed to my.Alltop

    Forensic Focus

  • UK FSR Digital forensics method validation: draft guidance

    29 Oct 2014 | 5:37 am
    "The UK Forensic Science Regulator has issued the linked document for consultation. https://www.gov.uk/government/consultations/digital-forensics-method-validation-draft-guidance For UK practitioners, big or small, the implications are considerable. If you don't agree with what is proposed you need to respond by the end the month. FWIW I think UK practitioners are sleep walking into a bureaucratic disaster in the years ahead..." Read More (forum post)
  • Oxygen Forensic Passware Analyst Acquires iCloud Data Even with iOS 8 Encryption

    28 Oct 2014 | 1:23 am
    Oxygen Forensics, Inc. announces Oxygen Forensic® Passware® Analyst can extract iCloud backup data of any Apple device even with iOS 8 encryption upgrades. Oxygen Forensic® Passware® Analyst acquires full iPhone, iPad and iPod Touch backups from iCloud provided that the Apple ID credentials are known. The backups are downloaded and automatically imported into Oxygen Forensic® Passware® Analyst. All versions of iOS, including the latest 8.1, are supported.
  • Improving Your Mobile Forensics Workflow

    27 Oct 2014 | 3:22 am
    Finding and analyzing evidence found on mobile devices may be the most important skill today’s digital forensics examiner can possess. Mobile devices have engrained themselves into our personal and professional lives. As a result, mobile devices (and the applications they contain) have become forensic goldmines of evidence – often times more valuable than a suspect’s work or personal computer. When it comes to your mobile forensics toolkit, you’ve likely become comfortable using tools like Cellebrite’s UFED to process most of your cases. Cellebrite is especially good at acquiring an…
  • Forensic Focus Forum Round-Up

    21 Oct 2014 | 7:37 am
    Welcome to this round-up of recent posts to the Forensic Focus forums. Is it legal to travel to China with full disk encryption on a laptop? Forum members discuss recovering deleted emails and OST/PST conversion. An OS HDD seems to contain files but is unreadable; how can it be accessed? Add your thoughts on the forum. A conversation about how data can be validated in forensic investigations, and the coining of the word 'Assumptionware'. Forum members discuss how to virtualise a disk image. How do you restore an iPhone that is stuck in recovery? Chime in on the forum. How much information…
  • Cyber crime: First online murder will happen by end of year, warns US firm

    20 Oct 2014 | 7:23 am
    Governments are ill-prepared to combat the looming threat of "online murder" as cyber criminals exploit internet technology to target victims, the European policing agency warned. In its most alarming assessment of the physical danger posed by online crime, Europol said it expected a rise in "injury and possible deaths" caused by computer attacks on critical safety equipment. Police forensic techniques need to "adapt and grow" to address the dangers posed by the so-called "Internet of Everything" – a new era of technological interconnectedness in which everything from garage doors to…
 
  • add this feed to my.Alltop

    (ISC)2 Blog

  • (ISC)² Releases Set of Cybersecurity Tips for CEOs

    (ISC)² Management
    30 Oct 2014 | 9:34 am
    To celebrate the 11th annual National Cyber Security Awareness Month (NCSAM), (ISC)² has released its fourth set of tips by security experts: cybersecurity tips for Chief Executive Officers (CEOs). “Two-factor authentication (something you have, know, or are) has become very important for system access. Passwords alone just do not cut it anymore. This is extremely important as we see the rapid rise in financial transactions, particularly on mobile devices. Ask your bank if two-factor authentication is available and if not, get another bank that does. Credit card companies and online…
  • The New Face of (ISC)² Elections

    (ISC)² Management
    29 Oct 2014 | 1:04 pm
    A Message from the Board Communications Committee on Board Elections  This year the (ISC)² Board of Directors election process emerges after a massive year-long facelift. Through the recommendations of last year’s Board of Directors and the tenacity of the (ISC)² Management team, this year marks an unprecedented shift as the organization adjusts election processes based on member feedback. We really try to be problem-solvers, and with our emphasis on member service, making sure we aligned the election process to meet the changing demands of our membership was paramount this year.
  • (ISC)² Credentials and the Absolute Requirement for Experience

    (ISC)² Management
    23 Oct 2014 | 1:41 pm
    By (ISC)² Board Chair Wim Remes and (ISC)² Executive Director Hord TiptonWhen it comes to information security credentials, (ISC) believes in the absolute requirement for experience; and this is a factor that leads to our organization often being referred to as the Gold Standard. We are distinguished amongst certifying bodies because we stress the value of collaboration, experience, and continuous learning to both the (ISC)membership and information security industry at large. And we don’t grandfather. While the value of education is obviously crucial in our field, or really any industry…
  • (ISC)² Releases Set of Cybersecurity Tips for Home Owners

    (ISC)² Management
    21 Oct 2014 | 8:29 am
    To celebrate the 11th annual National Cyber Security Awareness Month (NCSAM), (ISC)² has released its third set of tips by security experts: cybersecurity tips for home owners. “Whatever browser you use, make sure you are using the site evaluation tools available to help identify safe/not-so-safe sites. With this, you get a color-coded rating of the site before you visit. You can also establish secure connections on most sites automatically through add-ons and extensions. Don’t advertise your router address name (SSID).  Set it to hide. Use WPA2 security protocol.  Most all…
  • (ISC)² Global Research Program to Track Cybersecurity Skills Gap and Landscape Now Open

    (ISC)² Management
    20 Oct 2014 | 7:43 am
    In our digitally-driven world, it’s crucial to have a current understanding of the evolving risks and responsibilities that information security professionals face. The (ISC)2 Global Information Security Workforce Study (GISWS) is the only research available that truly offers a detailed picture of how the global cybersecurity professional is changing and driving other business factors. A respected industry benchmark referenced by governments, employers, professionals, and industry stakeholders around the world for more than 10 years, this ongoing research provides much needed insight into…
  • add this feed to my.Alltop

    viaForensics

  • A Letter from Dave Berg

    Dave Berg
    27 Oct 2014 | 7:08 pm
    Dear viaProtect users, A lot can happen over the course of one weekend. Some of our Android viaProtect users may have noticed an increase in mobile device battery and data usage starting early in the morning on Saturday, October 25. This may be due to a bug in viaProtect 1.3.2. We released this version of our app on October 20, 2014, but a bug caused the app to re-upload the same pieces of data from the device repeatedly. We worked through the weekend to resolve the issue, and yesterday, October 26, we pushed viaProtect 1.3.3 to the Google Play store. In the process, we found the root…
  • Chicago Tribune Interviews viaForensics CEO and President

    Linnea
    20 Oct 2014 | 8:09 am
    “Some of it’s luck, some of it is intuition, some of it is timing, and a lot of it is hard work… the way I look at it, you get one shot. And this is clearly our shot.” – Andrew Hoog, October 17, 2014 Read the full article
  • Hundreds of thousands of Android devices at risk to default browser vulnerability

    KevinS
    3 Oct 2014 | 11:28 am
    A recently disclosed same-origin policy (SOP) bypass flaw in the Android browser enables attackers to direct a user to a malicious page. That page runs JavaScript that allows them to read data from web pages the user has left open in other browsers. Hundreds of thousands of affected users “It’s a major issue,” Ted Eull, our VP of mobile security services told CSO Online. “Because the browser was included by default on many devices pre-KitKat (version 4.4), there are potentially hundreds of thousands of affected users.” The vulnerability affects many Android users…
  • Tips for Small Businesses to Protect Against a Data Breach

    KevinS
    29 Sep 2014 | 9:54 am
    Protecting Your Business From a Data Breach There have been a number of successful data breaches levied against large businesses recently. These companies include Home Depot, Target, UPS, Michaels, and others. Many smaller businesses are at serious risk as well. Companies that take credit cards as payment – and most today do – are targets for hackers that want a traditionally less secure, and therefore easier, target. Most smaller businesses don’t have the capital to put into computer and mobile security as larger organizations do, putting them at an even greater risk for…
  • viaTalks en español con Pau Oliva: demostración de análisis de aplicaciones móviles utilizando viaLab

    Linnea
    17 Sep 2014 | 1:14 pm
    El jueves 18 de septiembre nuestro ingeniero de seguridad móvil Pau Oliva (@pof) dará una viaTalks a las 11 de la mañana CDT donde se discutirá viaLab y dará una demostración. Regístrese El programa Él describirá viaLab y sus usos. Así, mostrará cómo se puede usar viaLab para analizar una aplicación móvil. Hablará sobre las opciones y explicará y los resultados de un análisis forense con viaLab. Para ver toda la demostración, no dude en inscribirse a esta viaTalks. Si tiene alguna pregunta o comentario para Pau, por favor hágalo a través de un comentario en este blog o a…
  • add this feed to my.Alltop

    DFI News All

  • Apple Pay Rival CurrentC Hacked

    eaustin
    30 Oct 2014 | 8:24 am
    CurrentC, a merchant-backed mobile payment system in development to rival Google Wallet and Apple Pay, has been hacked during its pilot phase.   As reported by the Wall Street Journal, the Merchant Customer Exchange (MCX) — developers of the CurrentC system — said the intrusion compromised the email addresses of some participants in the pilot program. In addition, some users who expressed interest in the NFC-based system may also have been affected.  Read more about Apple Pay Rival CurrentC HackedComments
  • Organizations Still Unprepared for Cyber Attacks

    eaustin
    30 Oct 2014 | 8:14 am
    Most organizations (67 percent) are facing rising threats in their information security risk environment, but over a third (37 percent) have no real-time insight on cyber risks necessary to combat these threats.Read more about Organizations Still Unprepared for Cyber AttacksComments
  • London Authorities Nab Suspect in $2.6M ATM Heist

    eaustin
    30 Oct 2014 | 7:31 am
    Cyber hits on ATMs are getting more frequent, but the authorities seem to be catching up: A man in the UK has been arrested in conjunction with a significant $2.6 million cash machine heist.  Read more about London Authorities Nab Suspect in $2.6M ATM HeistComments
  • Biggest Cybersecurity Exercise Ever Happening in Europe

    eaustin
    30 Oct 2014 | 7:11 am
    More than 200 organizations and 400 cybersecurity professionals from 29 European countries are testing their readiness to counter cyber attacks in a day-long simulation, organized by the European Network and Information Security Agency (ENISA).   Read more about Biggest Cybersecurity Exercise Ever Happening in Europe Comments
  • Law Enforcement's High-tech Battle to Stop Cyber Crime

    eaustin
    30 Oct 2014 | 6:37 am
    Cyber crime costs the global economy an estimated $400 billion a year, and as it grows in scale and sophistication, law enforcement is having to do the same.   The U.S. secret service helped prevent over $1 billion in fraud losses from cyber crime last year, but it is up against skilled and organized international crime networks.Read more about Law Enforcement's High-tech Battle to Stop Cyber CrimeComments
 
  • add this feed to my.Alltop

    Secure Hunter Anti-Malware » Secure Hunter Blog

  • Dyreza Banker Trojan Attackers Exploiting CVE-2014-4114 Windows Flaw Secure Hunter

    shadmin
    30 Oct 2014 | 5:51 pm
    The Dyreza Trojan is exploiting the recently disclosed CVE-2014-4114 vulnerability in Windows that was first used by the Sandworm attackers. Threatpost | The first stop for security news Secure Hunter Anti -Malware The post Dyreza Banker Trojan Attackers Exploiting CVE-2014-4114 Windows Flaw Secure Hunter appeared first on Secure Hunter Anti-Malware.
  • Popular Science Website Infected, Serving Malware Secure Hunter

    shadmin
    30 Oct 2014 | 5:53 am
    The website of Popular Science magazine was found infecting users with malware via the RIG exploit kit. Threatpost | The first stop for security news Secure Hunter Anti -Malware The post Popular Science Website Infected, Serving Malware Secure Hunter appeared first on Secure Hunter Anti-Malware.
  • Microsoft Warns of Crowti Ransomware Secure Hunter

    shadmin
    29 Oct 2014 | 5:52 pm
    Researchers with Microsoft have spotted a spike in Crowti, a ransomware similar to Cryptolocker that encrypts files on victims’ machines and then asks for payment to unlock them. Threatpost | The first stop for security news Secure Hunter Anti -Malware The post Microsoft Warns of Crowti Ransomware Secure Hunter appeared first on Secure Hunter Anti-Malware.
  • US-CERT Warns of Dyre Banking Trojan Secure Hunter

    shadmin
    29 Oct 2014 | 5:52 am
    DHS sounded the alarm Monday on Dyre, the banking Trojan that’s been siphoning bank credentials from large enterprises and major financial institutions. Threatpost | The first stop for security news Secure Hunter Anti -Malware The post US-CERT Warns of Dyre Banking Trojan Secure Hunter appeared first on Secure Hunter Anti-Malware.
  • The dangers of opening suspicious emails: Crowti ransomware

    shadmin
    28 Oct 2014 | 10:20 pm
    The Microsoft Malware Protection Center (MMPC) has seen a spike in number of detections for threats in the Win32/Crowti ransomware this month as the result of new malware campaigns. Crowti is a family of ransomware that when encountered will attempt to encrypt the files on your PC, and then ask for payment to unlock them. These threats are being distributed through spam email campaigns and exploits.  Crowti impacts both enterprise and home users, however, this type of threat can be particularly damaging in enterprise environments. In most cases, ransomware such as Crowti can encrypt…
  • add this feed to my.Alltop

    Elvidence | Computer Forensics

  • When is an Expert Opinion Allowed in Law?

    admin
    23 Oct 2014 | 9:39 pm
    There’s an old joke which says that the definition of ‘expert’ is derived from ‘ex’ – meaning a has been, and ‘spurt’ – meaning a drip under pressure. In the legal world though defining an expert is rather more serious. Similarly an opinion, in most cases, is simply whatever an individual thinks. However, the law likes to deal with facts which means that opinion can be something of a dirty word. Expert opinions are a different matter and are often called on when legal matters deal with specialist areas. Let’s take a more detailed look at when an expert opinion is…
  • Demystifying the eDiscovery Process

    admin
    16 Oct 2014 | 6:46 am
    As a society our increased reliance on computers, smartphones and other electronic gadgets means that more and more of our information is stored in digital form. From a lawyer’s point of view this electronically stored information (ESI) presents a number of challenges in terms of capturing and preserving material relevant to a particular case. What is ESI? Put simply, any device containing electronic storage can be a source of ESI. These can be company servers, desktop or laptop PCs and workstations used by employees, as well as mobile devices such as smartphones and tablets. ESI isn’t…
  • Elvidence Extends Market-leading eDiscovery Platform to the Web

    admin
    8 Oct 2014 | 4:22 pm
    PRESS RELEASE | SYDNEY, NSW (October 9, 2014) — Elvidence , a national forensic technology provider today announced a new secure, web-based eDiscovery offering designed to provide investigators, law firms, small and medium sized businesses (SMBs), with a fast, easy-to-use and cost-effective way to gather and analyse digital evidence. Elvidence can handle the entire eDiscovery lifecycle from processing and early case assessment through to analysis, review and production. All of this is delivered as a secure, web-based software as a service (SaaS) offering. The applications of this service…
  • Dealing With Data Breaches – Why Having a Plan May not be Enough

    admin
    5 Oct 2014 | 11:35 pm
    Data security breaches and hacking seem to make the news on a depressingly regular basis these days. This type of incident can cost a company dear both financially and in terms of the damage caused to its reputation. It’s crucial therefore that any response is effective and timely in order to first contain and then mitigate the effects of a breach or attack. This means having a plan in place to deal with security issues, but planning isn’t always enough. Take the case of retailer Target in the US, it had a security team and then latest tools in place but still managed to get caught out.
  • Data Loss Prevention with eDiscovery

    admin
    3 Oct 2014 | 2:31 am
    Information security is no laughing matter. Several recent incidents clearly demonstrate the damage that an information security breach can cause to a company’s brand and reputation. This article discusses the application of eDiscovery and Computer Forensics methods to help lessen the risk of your data falling into the wrong hands. To address this issue correctly, we must first distinguish the differences between Data Loss Prevention and Data Leak Prevention (DLP). Data loss occurs when data is leaked and falls into the hands of another party (such as a hacker or your competition). On the…
Log in