Articles about forensics

Image by Walther S

The six stages of post-security incident grief avoidance

AusCERT Audio Security and forensics man Ashley Deuble has outlined the six stages of good incident response that if followed could bring an enterprise in line with Fortune 50 best practice. The Griffith University security manager says the steps of preparation; identification; containment; eradication; recovery, and lessons learned are …
Darren Pauli, 26 May 2016
Cartoon man with hat and tie. Facial features replaced by question mark.

Inside Mandiant's biggest forensics breach battle: Is this Anthem?

Cyber Defence Summit Four researchers from American cybersecurity firm Mandiant have engaged in an eight-month epic battle against hackers behind one of the biggest breaches of this year. The quartet is not saying who the victim is, nor identifying the attackers. However, it is at the level of, and very-well could be, health insurers Anthem or …
Darren Pauli, 15 Oct 2015

Factory reset memory wipe FAILS in 500 MEELLION Android mobes

Half a billion Android phones could have data recovered and Google accounts compromised thanks to flaws in the default wiping feature, University of Cambridge scientists Laurent Simon and Ross Anderson have claimed. The gaffe apparently allows tokens for Google and Facebook, among others, to be recovered in 80 per cent of …
Darren Pauli, 22 May 2015

Plod wants your PC? Brick it with a USB stick BEFORE they probe it

Criminals, activists, and whistle-blowers have a new tool to help foil police by shutting down laptops before they are examined. "USBKill" is a script that turns an innocent-looking thumb drive into a kill switch that, when unplugged, forces computers to shut down. Author "Hephaestos" (@h3phaestos) says their tool will …
Darren Pauli, 5 May 2015

Mozilla peers into processes with student-built forensics probe

Student hackers from the University of Buenos Aires have developed with Mozilla an open-source forensics tool to analyse memory of running processes. Computer science quartet Marco Vanotti, Patricio Palladino, Nahuel Lascano, and Agustin Martinez Suñé are part of Masche Team, who are "highly motivated by coding, security and …
Darren Pauli, 16 Mar 2015
glass brain

Forensics: The Anatomy of Crime exhibition – blurs scientific interest with grotesque curiosity

Review "Within minutes of death, adult female blowflies arrive to lay eggs on a cadaver". So reads one of the captions at the Wellcome Collection's magnificently macabre: Forensics: The Anatomy of Crime exhibition. Morbid titillation, however, isn't the intent. The point is that forensic scientists can pinpoint the time of death by …
Kat Hall, 14 Mar 2015

Google Apple grapple brings crypto cop block to Android

Google is set to build default encryption into its new Android fondleslabs in a bid to foil police forensics (and maybe to copy or catch up with Apple). The security enhancement, reported by the Washington Post, follows Apple's release of iOS 8, which introduced broader encryption, and will ensure Google-powered devices will …
Darren Pauli, 19 Sep 2014
iPad Psycho image

That 'wiped' Android phone you bought is stuffed with NAKED SELFIES – possibly

It's hard being a security researcher. Several of them just had to view thousands of nude selfies pulled from second-hand phones and tablets for a campaign warning people who sell old devices. The beleaguered infosec bods saw 750 photos of naked women and 250 images of manhood from a pool of 40,000 photos still stored on a …
Darren Pauli, 9 Jul 2014
USB Stress Panic Button

Police at the door? Hit the PANIC button to erase your RAM

The next time the police kick down a hackers' door, suspects can reach for the Panic button to make it nigh-on impossible for plod to recover any data, even if they freeze their target PCs. The Panic button is a new Python app called "Centry Panic" and was developed to mitigate cold boot and direct memory access attacks on …
Darren Pauli, 28 May 2014
iPhone forensics beaten image

Thanks for nothing, Apple, say forensic security chaps

Felons wanting to best forensic investigators need only perform a factory reset of all current model iPhones, say forensic security experts. Apple's decision to encrypt data on the iPhone is responsible for this state of affairs because a factory reset erases the decryption key required to reveal the handset's contents, …
Darren Pauli, 1 May 2014

You've been arrested for computer crime: Here's what happens next

It isn't just paedophiles. It is the accountant who thinks he is worth more than the company decides to pay him, and decides to create and pay fictitious invoices. It is the card-cloning gangs buying and selling mag stripes and card dumps. It is the drug dealers who think they are smarter than the police. Or it is just the …
Stuart Burns, 7 Nov 2013
The Register breaking news

Boffins FREEZE PHONES to crack Android on-device crypto

Computer scientists at the Friedrich-Alexander University of Erlangen-Nuremberg, Germany (FAU) have demonstrated that it is possible for unauthorized parties to recover data from encrypted Android smartphones using cold boot attacks. And when they say cold, they mean it – below 10°C, to be precise. Android has included built- …
Neil McAllister, 16 Feb 2013
The Register breaking news

HP launches security service for after the horse has bolted

HP is getting into the lucrative security remediation sector with a consultancy service designed to minimize the effects of a successful attack, collect evidence for prosecution, and help recover what has been stolen or corrupted. "It's nearly impossible for organizations to prevent a breach, but they can take control of how …
Iain Thomson, 28 Jan 2013
The Register breaking news

Police use 24/7 power grid recordings to spot doctored audio

Forging audio recordings is a lot harder than it used to be, thanks to a new method of authenticating recordings based on the buzz of the electrical power grid at the time they were recorded. The oscillations of alternating current (AC) produce a distinct frequency – 50Hz in the UK, 60Hz in North America – that varies slightly …
Neil McAllister, 14 Dec 2012
The Register breaking news

Boffin claims Bigfoot DNA reveals BESTIAL BONKING

An American scientist is claiming DNA samples reportedly taken from Bigfoot show the beast is a product of mating between female humans and an undiscovered primate. Dr. Melba Ketchum has undergone a five-year examination of North American Sasquatch samples, and told The Register that she had discovered that the non-human …
Iain Thomson, 28 Nov 2012
The Register breaking news

Met bobbies get CSI kit to probe perps' mobes

The Metropolitan Police is deploying mobile phone forensic systems in 16 boroughs, allowing ordinary coppers to play their favourite CSI character with wrong 'uns' handsets. The kit comes from Radio Tactics, and is basically a Windows 7 PC loaded up with forensic software and a touch interface complete with step-by-step …
Bill Ray, 21 May 2012
The Register breaking news

UK cops seek boffins to build handheld DNA sniffer kit

The National Policing Improvement Agency wants to hear from companies that can supply Blighty's cops with mobile tech that spots DNA. Apparently the cops are spending millions sending samples off for DNA analysis, only to discover that there's no human DNA present. The NPIA wants to equip investigators with handheld kit that …
Bill Ray, 2 Dec 2011
The Register breaking news

Self-erasing flash drives destroy court evidence

The inner workings of solid state storage devices are so fundamentally different from traditional hard drives that forensic investigators can no longer rely on current preservation techniques when admitting evidence stored on them in court cases, Australian scientists said in a research paper. Data stored on Flash drives is …
Dan Goodin, 1 Mar 2011

Create a news alert about forensics, or find more stories about forensics.

Biting the hand that feeds IT © 1998–2018