Digital Forensics & Cyber Security Blog
Digital Forensics & Cyber Security Blog
Marine Corps Enhances Forensics Capability to Make Gathering Data Simple
The Marine Corps is enhancing an existing forensics exploitation capability used to differentiate between friend or foe on the battlefield. The Corps is updating the Expeditionary Forensics Exploitation Capability, or EFEC, with newer IT technology. The EFEC is a portable forensic laboratory used by Law Enforcement Battalions to recognize, collect, [...]
Windows 7 Support Ending on January 14, 2020
Microsoft made a commitment to provide 10 years of product support for Windows 7 when it was released on October 22, 2009. When this 10-year period ends, Microsoft will discontinue Windows 7 support so that we can focus our investment on supporting newer technologies and great new experiences. The specific end [...]
This Spyware Data Leak Is So Bad We Can’t Even Tell You About It
A consumer spyware vendor left a lot of incredibly sensitive and private data, including intimate pictures and private call recordings, for all to see on a server freely accessible over the internet. And it still hasn’t taken the data down. A company that sells consumer-grade software that lets customers spy [...]
How the FBI Tracked Michael Cohen’s Phones
Search warrant documents made public Tuesday show the FBI used highly secretive and controversial cellphone sweeping technology to zero-in on President Donald Trump’s former personal lawyer when agents raided his New York City home, hotel room and office last year. Agents using a Triggerfish cell-site simulator tracked the whereabouts of [...]
The ‘Internet of Bodies’ is Setting Dangerous Precedents
In a column for The Washington Post, Mary Lee, a mathematician for the RAND Corporation, warns that "the line between human and machine is blurring — and creating new concerns about consumer safety and privacy rights." There are electronic pills equipped with Wi-Fi transmitters, smart contact lenses with wireless circuits, cochlear implants [...]
Researchers Crack Open Notorious Fancy Bear Rootkit
UEFI malware has been in the wild for more than two years The Fancy Bear hacking group's Lojax rootkit is far from a one-off tool, and may have been active in the wild for years before it was first reported. This is according to an analysis from Netscout's ASERT team, which took [...]
Over a Year Later and WannaCry Still Poses a Real Threat
While largely contain eighteen months after the initial outbreak of the WannaCry Ransomware infection, the malware continues to rear its head on thousands, if not hundreds of thousands, of infected computers. When the WannaCry infection was first unleashed, security researcher Marcus Hutchins of Kryptos Logic registered a domain that acted as a kill switch for the [...]
Elcomsoft Extracts Apple Health Data from iCloud
Moscow - ElcomSoft Co. Ltd. is pleased to announce the release of Elcomsoft Phone Breaker 9.0, the update to the company's forensic extraction tool for macOS and Windows. Version 9.0 gains the ability to remotely access Apple Health data stored in Apple iCloud, becoming the first forensic tool on the [...]
Verizon is launching RCS Chat on the Pixel 3 on December 6th
Verizon has confirmed to The Verge that it will be launching RCS Chat on the Pixel 3 and 3 XL on December 6th. Only those two phones on Verizon will have the feature, but the company tells me that it is “committed to bringing advanced messaging to other Verizon smartphones in the [...]