Blog2018-08-27T16:56:57-06:00

Digital Forensics & Cyber Security Blog

Digital Forensics & Cyber Security Blog

Hackers Find Vulnerabilities in a US Military Fighter Jet

This weekend during DEFCON a team of highly vetted hackers tried to sabotage a vital system for a US military fighter jet. And they succeeded. It was the first time outsider researchers have been given physical access to the F-15 system to test for weaknesses. Two days later, the group [...]

Hackers Can Break into an iPhone With a Single Text

When you think about how hackers could break into your smartphone, you probably imagine it would start with clicking a malicious link in a text, downloading a fraudulent app, or some other way you accidentally let them in. It turns out that's not necessarily so—not even on the iPhone, where simply receiving an iMessage [...]

100 Million People Reportedly Impacted By Capital One Data Breach

The alleged hacker behind one of the biggest ever cyberattacks on a bank then boasted about what she’d done on Twitter and  Slack, according to the FBI. The news: The personal data of 100 million Americans and six million Canadians Capital One customers was stolen, the financial services firm revealed in [...]

Is AI the Future of Cybersecurity?

Cisco reported that in 2018 they blocked seven trillion threats on behalf of their customers. Capgemini Research Institute reported earlier this month that 61% of enterprises say they cannot detect breach attempts today without the use of AI technologies and that 73% of enterprises are testing use cases for AI [...]

7 Time Saving Strategies for Investigators

We wanted to share some useful tips from our friends at BlackBag: While the amounts of data in typical digital forensic cases today is a lot different than it was several years ago, the amount of time most investigators have to do their analysis has not changed. Below are 7 [...]

Pioneer Day

What is Pioneer Day? This day commemorates the entry of Brigham Young and the first group of Mormon pioneers into Utah’s Salt Lake Valley on July 24, 1847. The Mormon pioneers viewed their arrival as the founding of a Mormon homeland, hence Pioneer Day. The Mormons, as they were commonly [...]

Your 35-Character Password is Weak

According to Frank Gifford this 35-character password, FI7CTQsBDvsMwbQNyY6qxV2FunWIUpXpcZm, is surprisingly weak. Java’s util.Random class uses a pseudo-random number generator (PRNG) which creates a deterministic sequence of numbers. When one needs statistically random numbers, such as for Monte Carlo simulations, this is a great choice. It's fast - and if a model needs [...]

Load More Posts