Forensics - News, Features, and Slideshows

News

  • Murdoch University to open networking and games facility

    Murdoch University Information Technology (IT) has hatched a $2.6 million networking and gaming facility that puts the university at the “forefront of IT”, according to vice chancellor Eeva Leinonen.

    Written by Jennifer O'Brien07 March 18 13:49
  • Factory reset in Android phones leaves sensitive user data behind

    It's common sense to reset an Android phone to its factory state before selling or disposing of it. But beware, researchers recently found that this often fails to properly wipe all sensitive user data from the device.

    Written by Lucian Constantin22 May 15 21:03
  • Tool aims to help enterprise IT manage 'honeypot' hacker decoys

    A new tool called the Modern Honey Network (MHN) aims to make deploying and managing large numbers of honeypots easier so that enterprises can adopt such systems as part of their active defense strategies.

    Written by Lucian Constantin21 June 14 02:53
  • The Iomega brand is now LenovoEMC

    Iomega owner EMC said today it will replace the brand on business-class NAS products with LenovoEMC, a joint venture that now sells the SMB business hardware.

    Written by Lucas Mearian12 June 13 21:55
  • CIOs Should Be Prepared for Litigation Disasters

    IT departments usually have careful plans for what to do in natural disasters, but they need a litigation-readiness plan, too, so they'll be ready to handle ediscovery requests

    Written by John Curran27 May 13 12:55
  • Dutch bill seeks to give law enforcement hacking powers

    The Dutch government today presented a draft bill that aims to give law enforcement the power to hack into computer systems -- including those located in foreign countires -- to do research, gather and copy evidence or block access to certain data.

    Written by Loek Essers02 May 13 10:47
  • One in five data breaches are the result of cyberespionage, Verizon says

    Even though the majority of data breaches continue to be the result of financially motivated cybercriminal attacks, cyberespionage activities are also responsible for a significant number of data theft incidents, according to a report that will be released Tuesday by Verizon.

    Written by Lucian Constantin23 April 13 00:07
  • HP offering data-breach response and remediation services

    HP today announced data-breach remediation services intended to help organizations prepare for an incident related to data loss that would require fast response to meet both legal and digital forensics requirements.

    Written by Ellen Messmer28 Jan. 13 17:07
  • Many global organizations flub electronic-records requests

    More companies are tackling how to best set up their electronic records to be able to respond to any legal requests related to "electronic discovery" to quickly find internal documents for court purposes, but this "e-discovery" process is still a struggle, a survey published today indicates.

    Written by Ellen Messmer10 Jan. 13 13:58
  • One year after DigiNotar breach, Fox-IT details extent of compromise

    The 2011 security breach at Dutch certificate authority (CA) DigiNotar resulted in an extensive compromise and was facilitated in part by shortcomings in the company's network segmentation and firewall configuration, according to Fox-IT, the security company contracted by the Dutch government to investigate the incident.

    Written by Lucian Constantin31 Oct. 12 22:07
  • The collar bomber's explosive tech gaffe

    The man who claimed to have attached a bomb collar to an Australian high school student two weeks ago thought it would be a good idea to leave a ransom note on a USB stick looped around her neck. What he probably didn't realize is that he also left his name, hidden deep in the device's memory.

    Written by Robert McMillan18 Aug. 11 09:32
  • Metasploit 4.0 sets the stage for mass penetration testing

    Security product provider Rapid7 has updated its widely used open-source Metasploit exploitation framework, expanding the software so it supports enterprise IT security staff as well as its core audience of penetration testers.

    Written by Joab Jackson04 Aug. 11 07:05
[]