Investigations and Forensics

Investigations and Forensics news, information, and how-to advice

shutterstock 335609987
machine learning data code people silhouettes shadows

signs arrow confused

Quarter of firms can't tell how hackers get in

The majority of large companies have experienced a breach over the past twelve months, but almost a quarter, 23 percent, of firms do not know how the hackers got in, according to a new survey.

hindenburg disaster 1937

DDoS attacks: a perfect smoke screen for APTs and silent data breaches

Growing DDoS attacks more and more frequently try to distract incident response teams in order to hide much bigger security incidents.

cyber attack stock image

Attackers go on malware-free diet

To avoid detection, some hackers are ditching malware and living "off the land" -- using whatever tools are already available in the compromised systems.

nested russian botnet

GameOver ZeuS criminals spied on Turkey, Georgia, Ukraine and OPEC

The criminals behind the GameOver ZeuS Botnet didn’t just steal $100 million from banks -- they also spied on several countries on behalf of Russia, according to a Black Hat presentation Wednesday by an FBI agent and two other...

011215 president barack obama

Groups urge Obama to oppose cyberthreat sharing bills

U.S. President Barack Obama should oppose legislation intended to let businesses share cyberthreat information with each other and with government agencies because the bill would allow the sharing of too much personal information, a...

sdn nsa monitoring spying

Top global security experts defend encryption

As government officials continue to plea the case against strong encryption, a group of high-profile international security experts have published a paper arguing that allowing government agents special access to communications would...

medical records healthcare medicine file document claim form doctors office hospital 000000399129

Anthem confirms data breach, but full extent remains unknown

Anthem, the nation's second largest health insurance provider, confirmed that outsiders were able to compromise an unknown number of records, including complete profiles for individuals.

sony headquarters

FBI memo warns of malware possibly linked to hack at Sony Pictures

A Flash Alert issued by the FBI on Monday is warning those within its distribution circle about a type of malware that has the ability to destroy any system it infects. Those who have seen the memo, including the group where it was...

2014 11 14 value in passwords

After this judge's ruling, do you finally see value in passwords?

Judge rules authorities can use your fingerprint to unlock your smartphone. What that means for authentication and the future of passwords.

What did you expect to happen when you bought the electronic lock?

In a case where physical and cyber security merge, some think the judge in the case got it wrong. Here’s why the decision was right and what it means for you.

medical 3

Community Health Systems blames China for recent data breach

Community Hospital Systems (CHS), which operates just over 200 hospitals in 29 states, reported a data breach impacting about 4.5 million people on Monday. The incident, blamed on actors in China, was made public via an 8-K filing...

Why the recent court ruling on Gmail matters to you

Email may be coming under different guidance when it comes to warrants and subpoenas as society and the courts address the evolution of technology. Are you prepared to engage in the discussion?

internet gavel keyboard

Duo sentenced to 14 years for Apple Phishing scheme

Two people have been sentenced to a total of 14 years in prison for conducting a Phishing campaign that targeted banking details. The criminals accused, Constanta Agrigoroaie, 23, and Radu Savoae, 28, used the stolen funds as a means...

internet gavel keyboard

Microsoft's takedown of No-IP pushes innocents into the crossfire

On Monday, Microsoft said they were taking No-IP ( to task for failing to prevent criminals from abusing their services. The case is Microsoft's latest effort to slow the spread of malware online, but this time innocents are...

In Depth

Information overload: Finding signals in the noise

Signal-to-noise ratios are hard to manage. As a security professional, you want the threat data, you want the attack notifications and alerts, and you need intelligence. But, when there's too much coming in, those alerts and...

data tunnel information binary code
In Depth

Hackers capture dynamic data to prepare for effective, stealthy attacks

Hackers use offensive forensics to gain credentials such as user names and passwords that allow them to access sensitive data while concealing their identity, delaying attack discovery, and covering their tracks.

computer keyboard on fire 87584864
In Depth

Avoiding burnout: Ten tips for hackers working incident response

Recent security graduates entering the world of incident response, or those with a strong security background making a career move, face a challenging environment that often leads to frustration and burnout.

facial recognition

Why facial recognition isn't the way of the future...yet

It's the how the future is meant to be, isn't it? The good guys need to find a bad guy in a crowd of people, so they start scanning the environment with a camera that is equipped with facial recognition technology. Seconds later,...

Load More