Skip to navigation

DataBreachToday.eu

spacer
  • USA
  • UK
  • Europe
  • India
  • Asia
  • Sign In
  • Subscribe
  • Home
  • Technology
  • Forensics

Forensics

The Latest News

  • Article

    Anthem Attribution to China: Useful?

    Report Links Breach to Chinese Professor; Experts Respond By Mathew J. Schwartz
    spacer

    A new report details new clues suggesting that the massive data breach involving health insurer Anthem was launched by Chinese hackers. But will such evidence help businesses blunt future APT attacks?

  • Article

    Paris Attacks: The Cyber Investigation

    Digital Forensics Critical to the Case, Experts Say By Eric Chabrow and Mathew J. Schwartz
    spacer

    French authorities continue to investigate the Jan. 7 attack in Paris that claimed the lives of a dozen, including journalists and police officers. Information security experts say that cyber-forensic skills are crucial for finding the perpetrators.

  • Article

    Overcoming the Cloud Forensic Challenge

    Why Conventional Approaches Don't Work in the Cloud By Eric Chabrow
    spacer

    A challenge examiners face in conducting forensic investigations in the cloud is that they don't have access to the servers. That's just one problem the National Institute of Standards and Technology is addressing.

  • Article

    Nasdaq Hack Attribution Questioned

    Culprit and Motive Still Remain Unclear By Mathew J. Schwartz
    spacer

    Two zero-day vulnerabilities reportedly were exploited by the attackers who hacked NASDAQ's systems in 2010. While a senior U.S. legislator claims the hackers had "nation-state" backing, security experts say it's still not clear who hacked NASDAQ or why.

  • Article

    NIST Updating Mobile Forensics Guidance

    Significant Tech Changes Challenge Forensic Examiners By Eric Chabrow
    spacer

    When NIST issued "Guidelines on Cell Phone Forensics" in May 2007, Apple's introduction of the iPhone was a month away. Seven years later, NIST is revising its guidance and giving it a new moniker, "Guidelines on Mobile Device Forensics."

More news...

White Papers

  • Mobile Remote Deposit Capture: Balancing Fraud Prevention and Customer Convenience

    spacer

    For banks with strong mobile offerings, the huge demand for mobile RDC services is a major opportunity to win new customers. However, the increased usage of mobile RDC services can also increase...

  • The Future of Fraud Prevention - User Behavior How to Stop Fraudsters from Wreaking Havoc with Your Online Assets

    spacer

    Learn how to stop fraudsters from wreaking havoc with your online assets User Behavior Analytics (UBA) is the future of fraud prevention. Once only valued by early adopters, UBA has entered the...

  • Seven Steps to Software Security

    spacer

    Understanding technical security risk begins with knowing how and where vulnerabilities occur within an organization. These vulnerabilities are the gateway that malicious actors use to circumvent...

More white papers...

Webinars

  • Healthcare Information Security Today: 2015 Survey Results and Analysis

    What are the biggest cyberthreats facing healthcare entities today and on the horizon? What steps are healthcare organizations taking to prevent and detect breaches? And what are the top data security priorities for the year ahead? Join us for this webinar that will provide answers.

  • Security Alerts: Identifying Noise vs. Signals

    For anyone working in a security operations center, this is a familiar picture: lots of alerts, but not enough analysts; too many disparate tools to manage effectively; not enough visibility, and too...

More webinars...
ARTICLE Syrian Hackers Subvert Ad Network

The Syrian Electronic Army hacker collective has claimed credit for hacking into an advertising...

Latest Tweets and Mentions

ARTICLE Syrian Hackers Subvert Ad Network

The Syrian Electronic Army hacker collective has claimed credit for hacking into an advertising...

The ISMG Network

  • spacer
    Webinar

    I Found an APT: Now What? Operationalizing Advanced Threat and Breach Response

  • spacer
    Article

    Bill Altering Privacy Rule Advances

    Legislation Is Designed to Boost Medical Research, Innovation

  • spacer
    Article

    Sally Beauty Confirms Second Breach

    Retailer's Investigation of 'Illegal Intrusion' Continues

  • spacer
    Interview

    Art Coviello: Venture Capitalist

    Ex-RSA Chairman Joins Rally Ventures as Partner

  • spacer
    Article

    House Votes to Ban NSA Bulk Collection

    USA Freedom Act Passes by Wide Margin

  • spacer
    Article

    FTC's LabMD Case: The Next Steps

    Commission Won't Call Rebuttal Witness

  • spacer
    Article

    The Challenges of Securing Smart Cities

    Middle Eastern, Asian Leaders Align with Security Frameworks

  • spacer
    Interview

    Qatar Builds on Information Assurance

    QCERT's Ismael on How IA Helps CISOs Manage Risks

  • spacer
    Blog

    Government Critic Gets White House Role

    Princeton Professor Ed Felten Is New Federal Deputy CTO

  • spacer
    Interview

    Saudi Banks: Lessons from Attacks

    Banque Saudi Fransi's Osman on Responding to Top Threats

prev next