Computer Forensic Science

By Goyo Ambrosio | Goyo Ambrosio created a magazine on Flipboard. “Computer Forensic Science on Flipboard” is available with thousands of other magazines and all the news you care about. Download Flipboard for free and search for “Goyo Ambrosio”.

Top Five Digital Forensics Tools - Digital Forensics Global Recruitment

At Digital Forensics Global Recruitment, we pride ourselves on taking a thoroughly professional approach to our business, using our industry …

Forensics

Open-source code from Mars rover used in espionage campaign targeting Indian government

Two open-source code libraries used in the development of the historic Mars rover have been exploited by cybercriminals and moulded into an effective …

Malware

Vault 7 Leaks : CIA Malware "OutlawCountry" Controls Linux Machine and Redirect the Victims Traffic into CIA Controlled Machine - WikiLeaks

WikiLeaks Revealed another Secret Document of CIA Malware called “<b>OutlawCountry</b>” that targets Linux Running Machines which Control and Redirect all …

Linux

Estos políticos fueron atacados por el software espía vendido al gobierno de México

<i>Síguenos en Facebook para saber qué pasa en el mundo.</i><p>Tres funcionarios de alto rango de la oposición en México, fueron atacados con el software espía vendido al Gobierno para supuestamente combatir a criminales y terroristas.<p>Según un reporte de investigadores de la Universidad de Toronto los …

Serious privilege escalation bug in Unix OSes imperils servers everywhere

“Stack Clash” poses threat to Linux, FreeBSD, OpenBSD, and other OSes.<p>A raft of Unix-based operating systems—including Linux, OpenBSD, and …

Information Security

Advanced CIA firmware has been infecting Wi-Fi routers for years

Latest Vault7 release exposes network-spying operation CIA kept secret since 2007.<p>Home routers from 10 manufacturers, including Linksys, DLink, and …

Information Security

NIST Reveals Draft of Cybersecurity Framework

Industry experts and federal employees met at a workshop hosted this week at the National Institute of Standards and Technology in Gaithersburg, …

The FBI Used a 'Non-Public' Vulnerability to Hack Suspects on Tor

If the vulnerability was a so-called zero day, that would bring up all sorts of disclosure issues for the FBI.<p>When the FBI hacked thousands of computers related to a child porn investigation in 2015, the agency took advantage of a "non-publicly-known vulnerability," according to a judge in a …

Privacy

Hacked in Space: Are Satellites the Next Cybersecurity Battleground?

So many of the mundane, earthly things we rely on, from GPS to making a credit card transaction, are made possible by satellites orbiting beyond that blue sky, thousands of miles outside of Earth.<p>Space may feel like an untouchable realm, but as the systems we have in place get older, they're …

Cybersecurity

Concepts and Methodology in Mobile Devices Digital Forensics Education and Training

One of draft versios of "Concepts and Methodology in Mobile Devices Digital Forensics Education and Training",<p>Abstract - This paper presents various issues in digital forensics of mobile devices and how to address these issues in the related education and training process. Mobile devices forensics …

With Sqreen, web developers can seamlessly find and avoid security threats

French startup Sqreen wants you to rethink how you deal with security for your web-based apps. With little effort, Sqreen can inspect, track and fix security holes, acting like a shield. You won’t have to change your workflow as Sqreen plugs to your existing app.<p>The startup just raised $2.3 million …

Software

FBI says car hacking is a real risk

Security researchers have shown they can take over steering and disable the brakes of moving vehicles.<p>If you're not already worried about your car being hacked, you really should be, the US government says.<p>Connected cars are becoming "increasingly vulnerable" to cyberattack, according to an …

Security

Apple gets three extra days to decide if it will hack the iPhone for the FBI

Apple has a little more time to respond to the historic order to break security protections on a phone belonging to one of the alleged perpetrators of the San Bernardino attack. When the order was initially handed down Tuesday night, the company was given five days to respond as to whether the …

San Bernardino

A Hollywood hospital is being held to ransom by hackers

A Hollywood hospital's computer systems has been crippled by hackers, who are demanding a $3.6 million (£2.4 million) ransom.<p>The Hollywood Presbyterian Medical Centre has been hit by "ransomware" — a kind of malware that encrypts the victims' data, making it useless unless they pay a fine.<p>Its …

Security

Is Cybercrime Just a Cost of Doing Business?

Is cybercrime, once an annoyance, now an ever-present threat, next just a cost of doing business?<p>The evolution of malicious code, attacker …

Cops Say They Can Access Encrypted Emails on So-Called PGP BlackBerrys

Dutch police say they are able to read encrypted messages sent on the custom, security-focused BlackBerry devices.<p>Dutch investigators have confirmed to Motherboard that they are able to read encrypted messages sent on PGP BlackBerry phones—custom, security-focused BlackBerry devices that come …

Privacy

The 7 scariest gadgets the NSA uses to spy on cellphones

Yesterday, <i>The</i> <i>Intercept</i> published an extensive catalog detailing the innumerable gadgets and technologies used by the military, law enforcement …

Windows 10 is getting a massive update

Windows 10 is getting its first mega-update on Thursday.<p>After updating your Windows 10 PC, your computer will boot faster, your photos will be clearer, reminders will be easier to set, and your PC will perform more smoothly.<p>But Windows 10 won't look any different -- most of the improvements are …

Microsoft

How hackers broke into the CIA director's AOL account

It seems way too easy to hack into the personal email account of CIA director John Brennan.<p>On Monday, a group of hackers claimed credit for a breach of his email, as well as the account of Jeh Johnson, who heads the Department of Homeland Security.<p>The hackers were first interviewed by the New York …

Security

Hackers demand ransom from British telecom TalkTalk

British telecom TalkTalk said it has received a ransom demand following a "significant and sustained cyberattack" that put the data of four million customers at risk.<p>"We were contacted by someone claiming to be responsible, and seeking payment," the company said.<p>TalkTalk is one of Britain's leading …

Security

Security firm: Chinese hackers tried to steal tech and drug companies' secrets

Chinese government hackers have attempted to steal the secret sauce that makes American tech and drug companies tick, according to a prominent cybersecurity company.<p>Determining who is behind an attack is an extremely tricky business, since hackers can easily mask their locations.<p>But cyber firm …

Cybersecurity

Top 20 Free Digital Forensic Investigation Tools for SysAdmins

Here are 20 of the best free tools that will help you conduct a digital forensic investigation. Whether it’s for an internal human resources case, an …

Human Resources

What is Fluentd? | Fluentd

Fluentd was conceived by Sadayuki "Sada" Furuhashi in 2011. Sada is a co-founder of Treasure Data, Inc., a primary sponsor of the Fluentd project. …

51 Free Data Science Books

A great collection of <b>free data science books</b> covering a wide range of topics from Data Science, Business Analytics, Data Mining and Big Data to …

Data Science

Someone in China has hacked the Woods Hole Institute

The Woods Hole Oceanographic Institution, one of America's premiere scientific research centers, was reportedly hacked last June by unidentified forces operating in China. According to a staff letter sent by WHOI President and Director Mark Abbott this week, the institute has so far found that only …

Security

Free Alternative to Splunk Using Fluentd

Versions | <b>v0.12 (td-agent2) | v0.10 (td-agent1)</b><p>Splunk is a great tool for searching logs, but its high cost makes it prohibitive for many teams. In …