Investigations and Forensics

Investigations and Forensics news, information, and how-to advice

young executive at laptop being watched by hacker
us eu handshake

honey jar

This honeypot proves UX is essential to security solutions

Haroon Meer shares his insights on how to design security solutions that are delightful to use as they provide measureable value to security leaders

jennifer lawrence oscars

Celebgate: Social engineering used to steal celebrity nude photos

On Tuesday, the Department of Justice, U.S. Attorney’s Office, Central District of California announced that Ryan Collins, 36, of Lancaster, Pennsylvania, plead guilty to violation of the Computer Fraud and Abuse Act.

verizon sign

Verizon releases first-ever data breach digest with security case studies

Verizon is known for its huge annual Data Breach Investigations Report, but this morning it released a less data-heavy digest organized by case study

foot race starting line competition sports

Starting out in cybersecurity? Read lessons learned and enter competitions

What you can learn from Fidelis Cybersecurity and RSA

ransom note

Are you prepared to respond to ransomware the right way?

Rob Gresham explains the evolution of ransomware and shares insights into smarter ways to prepare and respond

gavel court trial

Security negligence goes to court

The number of people whose data was breached in 2015 exceeded that of the previous year. How do we plan to regulate these cases? What should organizations be compelled to do in order to protect the sensitive information they store?...

police lineup identification

Does attribution matter to security leaders?

Levi Gundert shares his experience on when, how, and why attribution matters for security leaders

shutterstock 335609987

FTC ruling suggests upcoming changes for data compliance regulation

Recent data breaches tell us what private and public sector victims are dealing with: disruption, reputational damage, and significant financial repercussions. They can also find themselves attracting the undesirable attention of...

machine learning data code people silhouettes shadows

Why we need behavior-centric detection and response

According to the Verizon 2015 Data Breach Investigations Report (DBIR), 60 percent of the time, attackers were able to compromise an organization within minutes. Meanwhile, in more than 75 percent of the cases, the average time to...

signs arrow confused

Quarter of firms can't tell how hackers get in

The majority of large companies have experienced a breach over the past twelve months, but almost a quarter, 23 percent, of firms do not know how the hackers got in, according to a new survey.

hindenburg disaster 1937

DDoS attacks: a perfect smoke screen for APTs and silent data breaches

Growing DDoS attacks more and more frequently try to distract incident response teams in order to hide much bigger security incidents.

cyber attack stock image

Attackers go on malware-free diet

To avoid detection, some hackers are ditching malware and living "off the land" -- using whatever tools are already available in the compromised systems.

nested russian botnet

GameOver ZeuS criminals spied on Turkey, Georgia, Ukraine and OPEC

The criminals behind the GameOver ZeuS Botnet didn’t just steal $100 million from banks -- they also spied on several countries on behalf of Russia, according to a Black Hat presentation Wednesday by an FBI agent and two other...

011215 president barack obama

Groups urge Obama to oppose cyberthreat sharing bills

U.S. President Barack Obama should oppose legislation intended to let businesses share cyberthreat information with each other and with government agencies because the bill would allow the sharing of too much personal information, a...

sdn nsa monitoring spying

Top global security experts defend encryption

As government officials continue to plea the case against strong encryption, a group of high-profile international security experts have published a paper arguing that allowing government agents special access to communications would...

medical records healthcare medicine file document claim form doctors office hospital 000000399129

Anthem confirms data breach, but full extent remains unknown

Anthem, the nation's second largest health insurance provider, confirmed that outsiders were able to compromise an unknown number of records, including complete profiles for individuals.

sony headquarters

FBI memo warns of malware possibly linked to hack at Sony Pictures

A Flash Alert issued by the FBI on Monday is warning those within its distribution circle about a type of malware that has the ability to destroy any system it infects. Those who have seen the memo, including the group where it was...

2014 11 14 value in passwords

After this judge's ruling, do you finally see value in passwords?

Judge rules authorities can use your fingerprint to unlock your smartphone. What that means for authentication and the future of passwords.

Load More