Close

Cybercrime

  • Improving Biometric and Forensic Technology: The Future of Research Datasets

    By: Administrator
    Forensic Magazine One of the biggest challenges facing the advancement of forensic science and biometric technology is the availability of useful datasets for researchers. The lack of sufficient data limits the development of new technology, methods and informed policy decisions. To help resolve this issue, NIJ has sponsored NIST to investigate publically available biometric and forensic datasets. On January 26-27, NIST will host a symposium to discuss the adequacy of these datasets and how to...
  • Are FBI Claims of Attribution of Sony Hacking Based on Questionable IP Addresses

    By: Administrator
    By: Thomas Fox-Brewster, Forbes FBI director James Comey has tried to shed some light on his agency’s claims that North Korea was behind the Guardians of Peace cyber attacks that tore apart Sony Pictures in November and forced the cancellation of The Interview, a comedy in which the two central characters are asked to assassinate the country’s leader Kim Jong-Un. But, according to security experts, it’s unlikely that his fresh assertions that the hackers were sloppy and leaked data that...
  • New account on Stuxnet worm in "Countdown to Zero Day"

    By: Administrator
    Dan Goodin, Ars Technica The Stuxnet computer worm that attacked Iran's nuclear development program was first seeded to a handful of carefully selected targets before finally taking hold in uranium enrichment facilities, according to a recently published book. Stuxnet "Pateint Zero"     The new account, included in Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon by Wired reporter Kim Zetter, is at odds with the now-popular narrative that the malware...
  • A Simplified Guide to Digital Evidence

    By: Administrator
    Introduction to Digital...
  • Cyber forensics: tips from a detective’s playbook

    By: Administrator
    By: Jayne Friedland Holland Editor's Note: No entity is immune from cyber-attack... least of all law enforcement agencies. The tips here were originally created for use by corporate IT departments, but this same information may be relevant for internal use by government investigative agencies. You approach the scene, taking the first steps to determining what happened and how to prevent it in the future. Following your training, you secure the area, conduct a scan of the scene, take photos to...
  • Digital Evidence, the New DNA in Criminal Cases

    By: Administrator
    Reprinted From: Computer Forensics International In 1911, it was fingerprints. In 1990, it was DNA. "In 2014, its digital evidence that's now playing a lead role at determining the fate of criminal defendants," says Mark McLaughlin of Computer Forensics International. The ability to place someone at the scene of a crime is typically done by eyewitnesses, or Digital Evidence through something unique they leave behind like fingerprints or DNA. And when a solid chain of custody is made, it...
  • An Introduction to Digital Forensics Webinar

    By: Administrator
    Learn the basics of digital forensics This is the official recording of Sirchie's An Introduction to Digital Forensics Webinar conducted on September 11, 2013 from 1-2 PM. Learn the basics of digital forensics including the difference between computers and mobile devices, what you should do when you encounter a digital device at a crime scene, and basics of how forensic analysis of mobile devices is performed. Digital Forensics Video: Cyberspace: Where Did the Term Come From Sign Up For...
  • Anti-Hacker Effort Thwarted by Lack of Cyber Warriors

    By: Administrator
    For the governments and corporations facing increasing computer attacks, the biggest challenge is finding the right cyber warriors to fight back.  Peter Apps and Brenda Goh, Reuters  For the governments and corporations facing increasing computer attacks, the biggest challenge is finding the right cyber warriors to fight back. Hostile computer activity from spies, saboteurs, competitors and criminals has spawned a growing industry of corporate defenders who can attract the best talent from...
  • Virus and Malware Bites and How to Stop Them

    By: Administrator
    Only the foolhardy runs a computer devoid of any sort of anti-virus protection these days. But even if you employ the latest, greatest and most expensive anti-virus software, your program has a major weak point... By: Don Penven Only the foolhardy runs a computer devoid of any sort of anti-virus protection these days. But even if you employ the latest, greatest and most expensive anti-virus software, your program has a major weak point—if a new virus pops forth from the depths of the...
  • Hacking at an ATM Near You

    By: Administrator
    As useful as they may be, ATMs are never-the-less vulnerable to both physical and cyber attacks. Edited by: Don Penven From Wire Services ATMs are plentiful these days. They first appeared at banks, some mounted on an outside wall near the front entrance and some were given a separate drive-through lane. Now you’ll find ATMs in grocery and department stores, convenience stores, airports and restaurants. Where people are likely to need cash, an ATM will be nearby. And maybe it’s the...
  • Catching a Cyber-Thief May Take a Lot Less Time

    By: Administrator
    So what’s with all the log time when prosecutors seemingly had a “slam-dunk” case? The way digital detectives characterize the process—it’s like trying to make sense out of 3-4 jig-saw puzzles all dumped into a single heap. From various media sources… City Councilor Donnie Snook made a dash toward freedom carrying a laptop computer as police bearing warrants approached his home. It didn’t call for a rocket scientist to figure out that the laptop probably held child porn—the...
  • According to NSA Officials, Edward Snowden's Leaks Were Masked By Job Duties

    By: Administrator
    More than three months after Edward Snowden revealed details of NSA secret surveillance activities, intelligence officials are still assessing the fallout from the former contractor's disclosures. By: Tom Gjelten, NPR More than three months after Edward Snowden revealed details of NSA secret surveillance activities, intelligence officials are still assessing the fallout from the former contractor's disclosures. But they already know how the leaks happened. "We have an extremely good idea of...
  • Cybercrime and the FBI

    By: Administrator
    The FBI leads the national effort to investigate high-tech crimes, including cyber-based terrorism, espionage, computer intrusions, and major cyber fraud. From the FBI Website We are building our lives around our wired and wireless networks. The question is, are we ready to work together to defend them? The FBI certainly is. We lead the national effort to investigate high-tech crimes, including cyber-based terrorism, espionage, computer intrusions, and major cyber fraud. To stay in front...
  • Is the CSI Effect Altering Criminal Behavior

    By: Administrator
    But the reality is that forensics, while precise in some aspects, is also susceptible to the vagaries we find in measurements and analyses as any other realm of science. By: Don Penven Based upon recent studies by Richard Overill of King’s College in London, it is quite possible that criminal behavior among certain individuals is being influenced by the “CSI Effect.”  We recognize the CSI Effect as being the increased expectation of the public at large and jurors sitting on criminal...
  • Hackers Indicted for Largest Known Data Breach Conspiracy

    By: Administrator
    A federal indictment made public in New Jersey charges five men with conspiring in a worldwide hacking and data breach scheme that targeted major corporate networks, stole more than 160 million credit card numbers and resulted in hundreds of millions of dollars in losses. Friday, 07/26/2013 - DFI News U.S. Dept. of Justice A federal indictment made public in New Jersey charges five men with conspiring in a worldwide hacking and data breach scheme that targeted major corporate networks, stole...