Scientists test forensic methods to acquire data from damaged mobile phones

Criminals sometimes damage their mobile phones in an attempt to destroy data. They might smash, shoot, submerge or cook their phones, but forensics experts can often retrieve the evidence anyway. Now, researchers at the National Institute of Standards … Continue reading Scientists test forensic methods to acquire data from damaged mobile phones

Companies investing in advanced forensic capabilities to identify attackers in greater detail

One in five companies are already using forensic investigations and other sophisticated methods to identify their attackers, like setting up honey pots and repositories of fake data to give attackers the idea they’ve hit real data while acting as a div… Continue reading Companies investing in advanced forensic capabilities to identify attackers in greater detail

Insights gained from working on more than 750 cybersecurity incidents

Many entities face the same security risks so it is essential to have an insight on how to manage them and respond in case of occurrence. BakerHostetler’s privacy and data protection team released its 2019 Data Security Incident Response Report, which … Continue reading Insights gained from working on more than 750 cybersecurity incidents

Free training course material on network forensics for cybersecurity specialists

Based on current best practices, the training includes performance indicators and means that will help those who take it increase their operational skills of tackling cyber incidents. Network forensics is more important than ever, since more and more d… Continue reading Free training course material on network forensics for cybersecurity specialists

Beagle free visual analytics tool helps bring cybercriminals to justice

A team of researchers is helping law enforcement crack down on email scammers, thanks to a new visual analytics tool that speeds up forensic email investigations and highlights critical links within email data. Email scams are among the most prevalent,… Continue reading Beagle free visual analytics tool helps bring cybercriminals to justice

Fooling security tools into believing malicious code was signed by Apple

The way developers of third-party security tools use the Apple code signing API could be exploited by attackers to make malicious code linger undetected on Macs, a security researcher has discovered. “Security, incident response, and forensics pr… Continue reading Fooling security tools into believing malicious code was signed by Apple

Analysis of 560 incidents demonstrates need for cyber resilience

Many entities face the same types of security incidents – some are viewed as handling the incident well, and for some it’s a disruptive and costly lesson. The ones that fare better have prepared for an incident and use lessons-learned from prior incide… Continue reading Analysis of 560 incidents demonstrates need for cyber resilience

Vermeer’s Camera: Uncovering the link between art criticism and cybersecurity

My mother is a lacemaker; thus, her attachment to the Vermeer painting of that name. It’s in the Louvre. If you only know it from reproductions, it’s smaller than you may expect – just 24.5cm by 21cm. Vermeer led me into the art of th… Continue reading Vermeer’s Camera: Uncovering the link between art criticism and cybersecurity