Blog Posts Tagged with "Investigation"
October 02, 2013 Added by:Stephen Marchewitz
A brief understanding of the process, time and overall cost of a Card Holder Data. All information contained in this article is for the purposes of awareness and education. If you have experienced a breach, contact a PFI company immediately.
August 08, 2012 Added by:Jeremy Sobeck
An executive discovered that an unauthorized remote access tool (RAT) on his computer. This type of attack requires very little sophistication. The company assumed the worst: confidential files had been stolen, malware had been installed, and the fired employee still had remote access to their systems...
August 07, 2012 Added by:Pierluigi Paganini
Thus the problem of acquisition using RFS tools is that not only is the original source (the computer) not subjected to seizure, it is not in a static environment and can be manipulated. Evidence obtained from an unsecured system can always be subject to a challenge to its authenticity and reliability...
August 06, 2012 Added by:Ben Kepes
For Dropbox to admit that they were investigating the issue internally is a tacit admission that it is an internal issue rather than anything external. Yes Dropbox has issues, and yes those issues would appear to be indicative of something broader – but that doesn’t call into question the entire concept of cloud...
July 09, 2012 Added by:Headlines
“Law enforcement agencies are looking for a needle, but what are they doing with the haystack? We need to know how law enforcement differentiates between records of innocent people, and those that are subjects of investigation, as well as how it handles, administers, and disposes of this information..."
July 03, 2012 Added by:Rafal Los
How can we both restore service quickly and solve a long-term systemic problems when we can't always tell that two issues are even related? Optimize the analysis between changes, connected systems and components to figure out dependencies in cases such as linked and distributed failures...
June 13, 2012 Added by:Headlines
While the objective of criminal elements largely remains the same, the ubiquity of the digital systems that pervade every aspect of our culture present a new set of challenges for law enforcement, and new breed of criminal. The following are the Federal Bureau of Investigations "most wanted" cyber crooks...
June 13, 2012 Added by:Headlines
"The Company's ongoing investigation recently revealed potential unauthorized access to servers containing personal information collected from a subset of merchant applicants. It is unclear whether the intruders looked at or took any personal information... however, the Company will notify potentially-affected individuals..."
June 12, 2012 Added by:Headlines
"Two American IPs were identified in the (cyber) attack against the oil ministry... The nature of the attack and the identity of the attackers have been discovered, but we cannot publicize it since we are still working on the case..."
June 11, 2012 Added by:Headlines
With the appointment of special investigators by Holder, the probe has widened to include the disclosure of the development of the Stuxnet virus, which infected systems that provided operations control for Iranian production networks, and was most likely produced to stifle Iran's nuclear weapons program...
June 06, 2012 Added by:Headlines
The FBI is probing the source of recently leaked information regarding covert cyber operations conducted by the U.S. government, particularly the Stuxnet attacks. Stuxnet is largely considered to be a game changer because the virus affected kinetic damage on equipment the targeted systems controlled...
June 01, 2012 Added by:Infosec Island Admin
Preserving forensic data is an essential aspect of incident response. The data acquired during the process is critical to containing the intrusion and improving security to defend against the next attack. Network defenders should make note of the following recommendations for retention of essential forensic data...
May 24, 2012 Added by:Rafal Los
Recently at TakeDownCon I brought up a term during my offense keynote that I thought the audience would, and should, be familiar with. Unfortunately, when I asked who was familiar with Root Cause Analysis only a few hands out of the whole room went up. This was a bit distressing...
March 26, 2012 Added by:Bozidar Spirovski
Manufactures don’t always know how to retrieve data stored in new phones, so how do investigators do it? Staying up-to-date is challenging but not impossible. As criminals come up with new ways to abuse them, strangely enough, this can be beneficial for forensics...
March 08, 2012 Added by:PCI Guru
The lawsuit points out a disconcerting issue with a cardholder data breach: Any incident investigation initiated by the card brands under the PCI standards is going to focus on PCI compliance and not on whether or not the breach actually occurred...
March 08, 2012 Added by:Wendy Nather
If you break security events down, you're generally looking for two things: normal activities that are being done by the wrong people, or abnormal activities being done by the right people. And by people I also mean systems, but it's sometimes hard to tell the difference...
Cyber-Criminals Quickly Adopt Critical Flas... Jerry Sommer on 10-25-2014
Cyber Security Careers: What You Need To Kno... Jerry Sommer on 10-25-2014
Q and A with Hacker "srblche srblchez"... chi nguyen on 10-25-2014