Investigations and Forensics

Investigations and Forensics news, information, and how-to advice

messaging apps threats security privacy thought bubbles
chinese espionage

alert hacking threat detected

Proposed 'hack back' law would not have stopped WannaCry

On Monday, the Financial Times published a story concerning a proposed bill form Representative Tom Graves, a Republican from Georgia's 14th district. Graves has proposed changing the Computer Fraud and Abuse Act (CFAA) to allow...

ryan benson

A day in the life of a threat researcher

After leaving Exabeam at the end of the workday, Ryan Benson’s mind doesn’t shut off when it comes to thinking about designing new defenses against Black Hats. See what his day looks like.

emmanuel macron france

Newly elected French president raises questions in trying to dupe hackers

Emerging trend of cyber deception, revealed by Emmanuel Macron, may be a slippery slope.

1 tracking hunting dogs horse

The Knights Fork: Hunting the hunter

The true ROI of cybersecurity investment is the delta in dwell time. There is direct correlation between cybersecurity investment and brand protection. Hunting gives an organization the opportunity to turn the tables on an adversary....

hacker hacked power grid

Why the Ukraine power grid attacks should raise alarm

The cyber-attacks in Ukraine are the first publicly acknowledged incidents to result in massive power outages. Grid defenders should develop anticipatory responses to these and other ICS attacks.

Ransomware 2.0: Anatomy of an emerging multibillion business

What to expect from and how to resist the fastest growing sector of cybercrime in 2017?

graduation cap with diploma stacked on books

Where to get a Master’s Degree in cybersecurity

2017 list of universities that offer a Master of Science (M.S.) in cybersecurity.

binary monitor tech digital moody hacker threat

Report: Most cybercriminals earn $1,000 to $3,000 a month

Most cybercriminals make between $1,000 and $3,000 a month, but 20 percent earn $20,000 a month or more, according to a recent report from Recorded Future

Group of executives holding trophy photo winners people men woman award

Incident response and our 'culture of winning'

Security professionals understand the immense value of a formal incident response plan, but management may not always see it the same way, especially as it may be viewed by stockholders or other interests as a "plan to fail". But...

hillary clinton florida campaign

Hillary Clinton might have been a pretty good president had she used Pretty Good Privacy

Had Presidential candidate Hillary Clinton employed basic email security techniques, she’d be President-elect.

shamed

Name and shame cybersecurity: a gift for cybercriminals?

Cybersecurity “name and shame” practice may significantly boost global cybercrime.

guccifer hillary clinton

Metadata wrecks Guccifer 2.0's claims of a Clinton Foundation hack

On Thursday, Scot Terban, a researcher known to many online as Dr. Krypt3ia, shared some forensics results with Salted Hash. After checking with FOCA, the metadata shows the recently leaked documents from Guccifer 2.0 didn't actually...

credit cards

Diversified supply chain helps 'Vendetta Brothers' succeed in criminal business

Even smaller criminal groups are using smarter business tactics to help insulate themselves from prosecution and to diversify their product supply.

sept11

Memories of 9/11: More than lost buildings

Like many, my memories of 9/11 are personal and still vivid. Here's my story plus some little-known information about lost evidence on that day.

security group team circuitry

Cyber incident response: Who does what?

“Who in the government will help me if we face a significant cyber incident?”

Identity and SDLC

Identity governance and admin: beyond basic access management

IGA solutions go beyond traditional identity management by allowing deep insight into access, providing data owners, auditors, and security teams with valuable information needed for timely management decisions and response.

voting sign

FBI: Common scanning tools used to target state election systems

An FBI memo citing information released by MS-ISAC says that foreign actors are using common scanning tools to locate vulnerable election systems. There is evidence to suggest, but not conclusively prove, that at least two incidents...

Fake attacks by insiders to fool companies

Famous cybercrime groups and hacktivists “brands” may be a smokescreen to cover sophisticated insider attacks.

Load More