Investigations and Forensics

Investigations and Forensics news, information, and how-to advice

north korea statue pyongyang
computer forensics

salted hash cms hero th3

Salted Hash Ep 15: The state of security now and the not too distant future

This week, Salted Hash is joined by Rob Lee, faculty fellow at the SANS Technology Institute, to talk about preventable IT security and the state of the industry as 2018 gets underway.

human weak link cybersecurity primary

Why incident response is the best cybersecurity ROI

Former White House CIO says unexpected breaches can wreak havoc on a company's bottom line. Proper incident response planning can mitigate damage costs.

Applied Materials, Inc.

4 Applied Materials executives fleece company and get indicted

U.S. Attorney for Northern California indicted four former executives for stealing intellectual property and trade secrets from Applied Materials.

11 hacker keyboard user laptop

Insider threat — Chemours employee steals trade secrets

Chemours' off-boarding process provided the evidence that Jerry Jindong Xu stole trade secrets and intellectual property and tried to monetize the information in China.

computer forensics

Do you really know what happened during that data breach?

Endpoint tool providers are redefining “forensics” based upon their own product’s capabilities. Make sure you understand the deep-dive forensic capabilities—and more importantly, the limitations—of any vendor’s platform before you buy....

eliminate insider threats 1

Insider information leads to fraud scheme, arrests and conviction

Employees at HSBC Bank plc used insider information to their benefit, defrauding a client and generating millions of dollars for themselves.

ermergency reponse siren

Policing in the future involves citizen detectives and a Pokémon Go-like app

Using the Automon app, a Dutch “police of the future” technology initiative, citizens can score points by finding stolen cars.

us capitol building

Trusted insider at the federal level raises concerns

Charged with bank fraud, Imran Awan provided IT services to the U.S. House of Representatives for 14 years. Is he a white-collar criminal or something more sinister?

Equifax logo with keyboard lock and credit cards

From Equifax to Equi-'enterprise'

By now the Equifax debacle, disaster, ineptitude...has been wildly chastised and 1 in 2 Americans impacted by this have (or should have) taken corrective action. There is a lesson to be learned here not just by you and I as consumers,...

android oreo livestream

Security firms team up to neutralize WireX botnet after multiple DDoS attacks

Researchers from Akamai, Cloudflare, Flashpoint, Google, Oracle (Dyn), RiskIQ, Team Cymru, and others worked together to take down an Android-based botnet responsible for several DDoS attacks earlier this month.

messaging apps threats security privacy thought bubbles

Can Shakespeare solve our messaging app crisis?

The messaging app Telegram announced earlier this week it was stepping up its efforts to thwart terrorism communication. A college literature professor may have the perfect solution for the problem.

chinese espionage

U.S. defense contractor arrested for giving U.S. secrets to Chinese operatives

Kevin Mallory, a U.S. defense contractor, was arrested for allegedly passing secret and top secret U.S. documents to Chinese intelligence.

alert hacking threat detected

Proposed 'hack back' law would not have stopped WannaCry

On Monday, the Financial Times published a story concerning a proposed bill form Representative Tom Graves, a Republican from Georgia's 14th district. Graves has proposed changing the Computer Fraud and Abuse Act (CFAA) to allow...

ryan benson

A day in the life of a threat researcher

After leaving Exabeam at the end of the workday, Ryan Benson’s mind doesn’t shut off when it comes to thinking about designing new defenses against Black Hats. See what his day looks like.

emmanuel macron france

Newly elected French president raises questions in trying to dupe hackers

Emerging trend of cyber deception, revealed by Emmanuel Macron, may be a slippery slope.

1 tracking hunting dogs horse

The Knights Fork: Hunting the hunter

The true ROI of cybersecurity investment is the delta in dwell time. There is direct correlation between cybersecurity investment and brand protection. Hunting gives an organization the opportunity to turn the tables on an adversary....

hacker hacked power grid

Why the Ukraine power grid attacks should raise alarm

The cyber-attacks in Ukraine are the first publicly acknowledged incidents to result in massive power outages. Grid defenders should develop anticipatory responses to these and other ICS attacks.

Ransomware 2.0: Anatomy of an emerging multibillion business

What to expect from and how to resist the fastest growing sector of cybercrime in 2017?

Load More