Investigations/Forensics

Investigations/Forensics news, information, and how-to advice

sony headquarters
2014 11 14 value in passwords

What did you expect to happen when you bought the electronic lock?

In a case where physical and cyber security merge, some think the judge in the case got it wrong. Here’s why the decision was right and what it means for you.

medical 3

Community Health Systems blames China for recent data breach

Community Hospital Systems (CHS), which operates just over 200 hospitals in 29 states, reported a data breach impacting about 4.5 million people on Monday. The incident, blamed on actors in China, was made public via an 8-K filing...

Why the recent court ruling on Gmail matters to you

Email may be coming under different guidance when it comes to warrants and subpoenas as society and the courts address the evolution of technology. Are you prepared to engage in the discussion?

internet gavel keyboard

Duo sentenced to 14 years for Apple Phishing scheme

Two people have been sentenced to a total of 14 years in prison for conducting a Phishing campaign that targeted banking details. The criminals accused, Constanta Agrigoroaie, 23, and Radu Savoae, 28, used the stolen funds as a means...

internet gavel keyboard

Microsoft's takedown of No-IP pushes innocents into the crossfire

On Monday, Microsoft said they were taking No-IP (noip.com) to task for failing to prevent criminals from abusing their services. The case is Microsoft's latest effort to slow the spread of malware online, but this time innocents are...

tiger3
In Depth

Information overload: Finding signals in the noise

Signal-to-noise ratios are hard to manage. As a security professional, you want the threat data, you want the attack notifications and alerts, and you need intelligence. But, when there's too much coming in, those alerts and...

In Depth

Hackers capture dynamic data to prepare for effective, stealthy attacks

Hackers use offensive forensics to gain credentials such as user names and passwords that allow them to access sensitive data while concealing their identity, delaying attack discovery, and covering their tracks.

computer keyboard on fire 87584864
In Depth

Avoiding burnout: Ten tips for hackers working incident response

Recent security graduates entering the world of incident response, or those with a strong security background making a career move, face a challenging environment that often leads to frustration and burnout.

facial recognition

Why facial recognition isn't the way of the future...yet

It's the how the future is meant to be, isn't it? The good guys need to find a bad guy in a crowd of people, so they start scanning the environment with a camera that is equipped with facial recognition technology. Seconds later,...

Why you need more than daily practice to be good at incident response

Move past constant reaction with an evidence-driven approach to improve incident response and the entire protection cycle. Calculate the financial impacts of incidents and solutions to make better decisions that protect what matters...

Were stolen passports allowed on MH370?

Late Friday evening my wife shared with me the news that Malaysian Airlines flight MH370 had gone missing. I got quiet. This was the very same flight path route that I took from to Kuala Lumpur to Beijing a few months ago after...

Why smart security leaders are using the Target breach to change their approach to detection

Two months after the Target data breach, emphasis remains on prevention. The smart security leaders are improving detection. Here are some insights on making the pivot.

If Target got breached because of third party access, what does that mean for you?

The real opportunity for security professionals is to side-step speculation and use the coverage to spark productive conversations. The kinds of discussions that help others understand your value and set the stage for necessary...

Danger looms at the 2014 Winter Olympic Games in Sochi, but is Russia's security up to snuff?

Threats of terrorism and extensive security measures suggest that Sochi is preparing to host an Olympics like none other

8 ways physical security has evolved

Physical security has come a long way since the advent of the lock and key. But for all of its changes, the greatest aspect of the evolution of physical security is how it has begun to mesh with our digital world. Here are eight of...

Blue Cross: 840,000 healthcare records at risk after laptop theft

Two employee laptops stolen in November from Horizon Blue Cross Blue Shield of New Jersey

Shopping risks to guard against this holiday season

Credit card skimming devices and hidden cameras are just two ways crooks make this the most scam-filled time of the year for shoppers

Keeping high-profile meetings safe and secure

Advanced technology and the ubiquity of smartphones make it easier than ever for outsiders to comprimise the security of meetings, but Harlan Calhoun has some tips to fight off would-be spies

Load More