Computer Forensic Science

By Goyo Ambrosio | Goyo Ambrosio created a magazine on Flipboard. “Computer Forensic Science on Flipboard” is available with thousands of other magazines and all the news you care about. Download Flipboard for free and search for “Goyo Ambrosio”.

Top Five Digital Forensics Tools - Digital Forensics Global Recruitment

At Digital Forensics Global Recruitment, we pride ourselves on taking a thoroughly professional approach to our business, using our industry …

Open-source code from Mars rover used in espionage campaign targeting Indian government

Two open-source code libraries used in the development of the historic Mars rover have been exploited by cybercriminals and moulded into an effective …

Vault 7 Leaks : CIA Malware "OutlawCountry" Controls Linux Machine and Redirect the Victims Traffic into CIA Controlled Machine - WikiLeaks

WikiLeaks Revealed another Secret Document of CIA Malware called “<b>OutlawCountry</b>” that targets Linux Running Machines which Control and Redirect all …

Estos políticos fueron atacados por el software espía vendido al gobierno de México

<i>Síguenos en Facebook para saber qué pasa en el mundo.</i><p>Tres funcionarios de alto rango de la oposición en México, fueron atacados con el software espía vendido al Gobierno para supuestamente combatir a criminales y terroristas.<p>Según un reporte de investigadores de la Universidad de Toronto los …

Serious privilege escalation bug in Unix OSes imperils servers everywhere

“Stack Clash” poses threat to Linux, FreeBSD, OpenBSD, and other OSes.<p>A raft of Unix-based operating systems—including Linux, OpenBSD, and …

Information Security

Advanced CIA firmware has been infecting Wi-Fi routers for years

Latest Vault7 release exposes network-spying operation CIA kept secret since 2007.<p>Home routers from 10 manufacturers, including Linksys, DLink, and …

Information Security

NIST Reveals Draft of Cybersecurity Framework

Industry experts and federal employees met at a workshop hosted this week at the National Institute of Standards and Technology in Gaithersburg, …

Cybersecurity

The FBI Used a 'Non-Public' Vulnerability to Hack Suspects on Tor

If the vulnerability was a so-called zero day, that would bring up all sorts of disclosure issues for the FBI.<p>When the FBI hacked thousands of computers related to a child porn investigation in 2015, the agency took advantage of a "non-publicly-known vulnerability," according to a judge in a …

Hacked in Space: Are Satellites the Next Cybersecurity Battleground?

So many of the mundane, earthly things we rely on, from GPS to making a credit card transaction, are made possible by satellites orbiting beyond that blue sky, thousands of miles outside of Earth.<p>Space may feel like an untouchable realm, but as the systems we have in place get older, they're …

Cybersecurity

Concepts and Methodology in Mobile Devices Digital Forensics Education and Training

One of draft versios of "Concepts and Methodology in Mobile Devices Digital Forensics Education and Training",<p>Abstract - This paper presents various issues in digital forensics of mobile devices and how to address these issues in the related education and training process. Mobile devices forensics …

With Sqreen, web developers can seamlessly find and avoid security threats

French startup Sqreen wants you to rethink how you deal with security for your web-based apps. With little effort, Sqreen can inspect, track and fix security holes, acting like a shield. You won’t have to change your workflow as Sqreen plugs to your existing app.<p>The startup just raised $2.3 million …

FBI says car hacking is a real risk

Security researchers have shown they can take over steering and disable the brakes of moving vehicles.<p>If you're not already worried about your car being hacked, you really should be, the US government says.<p>Connected cars are becoming "increasingly vulnerable" to cyberattack, according to an …

Security

Apple gets three extra days to decide if it will hack the iPhone for the FBI

Apple has a little more time to respond to the historic order to break security protections on a phone belonging to one of the alleged perpetrators of the San Bernardino attack. When the order was initially handed down Tuesday night, the company was given five days to respond as to whether the …

Privacy

A Hollywood hospital is being held to ransom by hackers

A Hollywood hospital's computer systems has been crippled by hackers, who are demanding a $3.6 million (£2.4 million) ransom.<p>The Hollywood Presbyterian Medical Centre has been hit by "ransomware" — a kind of malware that encrypts the victims' data, making it useless unless they pay a fine.<p>Its …

Is Cybercrime Just a Cost of Doing Business?

Is cybercrime, once an annoyance, now an ever-present threat, next just a cost of doing business?<p>The evolution of malicious code, attacker …

Cops Say They Can Access Encrypted Emails on So-Called PGP BlackBerrys

Dutch police say they are able to read encrypted messages sent on the custom, security-focused BlackBerry devices.<p>Dutch investigators have confirmed to Motherboard that they are able to read encrypted messages sent on PGP BlackBerry phones—custom, security-focused BlackBerry devices that come …

The 7 scariest gadgets the NSA uses to spy on cellphones

Yesterday, <i>The</i> <i>Intercept</i> published an extensive catalog detailing the innumerable gadgets and technologies used by the military, law enforcement …

Surveillance