Blog Posts Tagged with "Investigation"
What to Expect When You're NOT Expecting: 7 Steps of a Professional Forensic Investigator
October 02, 2013 Added by:Stephen Marchewitz
A brief understanding of the process, time and overall cost of a Card Holder Data. All information contained in this article is for the purposes of awareness and education. If you have experienced a breach, contact a PFI company immediately.
Comments (0)
Employee Fired for Spying on Management with RAT
August 08, 2012 Added by:Jeremy Sobeck
An executive discovered that an unauthorized remote access tool (RAT) on his computer. This type of attack requires very little sophistication. The company assumed the worst: confidential files had been stolen, malware had been installed, and the fired employee still had remote access to their systems...
Comments (0)
Remote Forensics Trojans, Surveillance and Investigations
August 07, 2012 Added by:Plagiarist Paganini
Thus the problem of acquisition using RFS tools is that not only is the original source (the computer) not subjected to seizure, it is not in a static environment and can be manipulated. Evidence obtained from an unsecured system can always be subject to a challenge to its authenticity and reliability...
Comments (0)
Dropbox Security Issues: IT Has Only Itself to Blame
August 06, 2012 Added by:Ben Kepes
For Dropbox to admit that they were investigating the issue internally is a tacit admission that it is an internal issue rather than anything external. Yes Dropbox has issues, and yes those issues would appear to be indicative of something broader – but that doesn’t call into question the entire concept of cloud...
Comments (0)
Law Enforcement Sought 1.3 Million Cell Phone Records in 2011
July 09, 2012 Added by:Headlines
“Law enforcement agencies are looking for a needle, but what are they doing with the haystack? We need to know how law enforcement differentiates between records of innocent people, and those that are subjects of investigation, as well as how it handles, administers, and disposes of this information..."
Comments (0)
The Resilient Enterprise: Resolving Issues Faster
July 03, 2012 Added by:Rafal Los
How can we both restore service quickly and solve a long-term systemic problems when we can't always tell that two issues are even related? Optimize the analysis between changes, connected systems and components to figure out dependencies in cases such as linked and distributed failures...
Comments (0)
The FBI's Most Wanted Cyber Criminals
June 13, 2012 Added by:Headlines
While the objective of criminal elements largely remains the same, the ubiquity of the digital systems that pervade every aspect of our culture present a new set of challenges for law enforcement, and new breed of criminal. The following are the Federal Bureau of Investigations "most wanted" cyber crooks...
Comments (0)
Global Payments Breach May Include Merchant Account Data
June 13, 2012 Added by:Headlines
"The Company's ongoing investigation recently revealed potential unauthorized access to servers containing personal information collected from a subset of merchant applicants. It is unclear whether the intruders looked at or took any personal information... however, the Company will notify potentially-affected individuals..."
Comments (0)
Iran Fingers US Hackers in Oil Ministry Attacks
June 12, 2012 Added by:Headlines
"Two American IPs were identified in the (cyber) attack against the oil ministry... The nature of the attack and the identity of the attackers have been discovered, but we cannot publicize it since we are still working on the case..."
Comments (0)
Attorney General Taps Federal Prosecutors for Stuxnet Leak
June 11, 2012 Added by:Headlines
With the appointment of special investigators by Holder, the probe has widened to include the disclosure of the development of the Stuxnet virus, which infected systems that provided operations control for Iranian production networks, and was most likely produced to stifle Iran's nuclear weapons program...
Comments (0)
FBI Opens Investigation into Stuxnet Attack Leaks
June 06, 2012 Added by:Headlines
The FBI is probing the source of recently leaked information regarding covert cyber operations conducted by the U.S. government, particularly the Stuxnet attacks. Stuxnet is largely considered to be a game changer because the virus affected kinetic damage on equipment the targeted systems controlled...
Comments (0)
ICS-CERT: Preserving Forensic Data
June 01, 2012 Added by:Infosec Island Admin
Preserving forensic data is an essential aspect of incident response. The data acquired during the process is critical to containing the intrusion and improving security to defend against the next attack. Network defenders should make note of the following recommendations for retention of essential forensic data...
Comments (0)
Root Cause Analysis (RCA): A Critical Skill
May 24, 2012 Added by:Rafal Los
Recently at TakeDownCon I brought up a term during my offense keynote that I thought the audience would, and should, be familiar with. Unfortunately, when I asked who was familiar with Root Cause Analysis only a few hands out of the whole room went up. This was a bit distressing...
Comments (0)
Seven Problems with Cell Phone Forensics
March 26, 2012 Added by:Bozidar Spirovski
Manufactures don’t always know how to retrieve data stored in new phones, so how do investigators do it? Staying up-to-date is challenging but not impossible. As criminals come up with new ways to abuse them, strangely enough, this can be beneficial for forensics...
Comments (5)
PCI: When a Breach is Not a Breach
March 08, 2012 Added by:PCI Guru
The lawsuit points out a disconcerting issue with a cardholder data breach: Any incident investigation initiated by the card brands under the PCI standards is going to focus on PCI compliance and not on whether or not the breach actually occurred...
Comments (0)
In Fifty Gigabytes, Turn Left: Data-Driven Security
March 08, 2012 Added by:Wendy Nather
If you break security events down, you're generally looking for two things: normal activities that are being done by the wrong people, or abnormal activities being done by the right people. And by people I also mean systems, but it's sometimes hard to tell the difference...
Comments (0)
- University of Arizona Researchers Going on Offense and Defense in Battle Against Hackers
- Securing the Internet of Things (IoT) in Today's Connected Society
- What Is Next Generation SIEM? 8 Things to Look For
- Cybersecurity and Online Trading: An Overview
- Artificial Intelligence: The Next Frontier in Information Security
- Five Main Differences between SIEM and UEBA
- For Cybersecurity, It’s That Time of the Year Again
- Myth Busters: How to Securely Migrate to the Cloud
- Microsoft Makes OneDrive Personal Vault Available Worldwide
- Human-Centered Security: What It Means for Your Organization