Mark this date: On March 20th 2013, the non-technical managers may finally start to understand what a digital forensics professional actually does. With the massive cyber attacks on South Korean banks, media outlets, and ISPs, the role of forensicators is put front and center. The attack(s) resulted in widespread ATM outages, online banking and mobile banking offline, and tens of thousands of PCs wiped of all their data. At minimum, non-technical decision makers should finally start to understand that cyber attackers are not targeting "someone else." The attacks in South Korea had an impact on the bottom line of many South Korean firms. Since many of the same strategies for information security and incident response are used by most westernized nations, many experts agree that the attacks in South Korea are a warning sign of what could happen in the United States. We have analytical coverage of the South Korean attacks, with stories and drill downs that go beyond the headlines.
Was it only a week ago that the world was abuzz about the protests starting over the tracking and data collection from Google Glass? We have a forensic look at augmented reality. And, flaws in other mobile platforms that might help forensic professionals gain access to devices in a pinch.
If you have an item you'd like to contribute to Digital Forensics Case Leads, please send it to email@example.com.
- BlackBag Technologies Releases BlackLight2013: Mac OS X, iPhone, and iPad Forensics Software Release
- Katana Forensics recently updated Latern3 to include iOS and many Android device, all in one software tool
- EnCase Forensic Imager is a new product that allows the creation of EnCase evidence files or EnCase logical evidence files. EnCase Forensic Imager is available for free, and does not require an EnCase license.
- Defendant's Proportionality Argument Saves $120,000+ in E-Discovery Costs
- Digital security snake oil: Vendors capitalizing on media attention regarding data breaches (written by your case leads blogger)
- Dr Larry Ponemon recently released two studies that relate to this week's case leads: One, on the struggles companies undergo when handling breach incident response: The Post Breach Boom; and another study where he looks at the challenges of fighting insider fraud.
- Five Lessons From the FBIs Insider Threat Program
- Google Glass Will Bring Info To You, Says Sergey Brin. Also Brings Discoverable Evidence To Litigation (written by your case leads blogger)
- Forensics discussed - Your hard drive will self-destruct at 2pm: Inside the South Korean cyberattack
- Covers forensics and IR - Cyberattack hits South Korea's banks, media
- More and more, forensicators and IR pros will need to be Apple fluent - New OS X trojan injects ads into pages browsed by Chrome, Firefox, and Safari; even targets Apple's website
- Broadcasters are targets, in South Korea, and elsewhere - BBC Twitter accounts hijacked by group calling themselves the Syrian Electronic Army
- Android, iOS bugs expose phones to voyeurs, data thieves [and forensicators]
- Alabama Attorney General says Internet making it easier to catch sexual predators, but police need more training on digital evidence
- Ohio judge calls speed cameras a ?scam,' based on fifth amendment grounds
- U.S. government is expanding a cybersecurity program that scans Internet content to include far more of the country's private, civilian-run infrastructure
- Crowd Sourced Internet Photo Forensics Gone Wild - Even More Proof That Super Replicas Is A Scam
- IMF 2013 - 7th International Conference on IT Security Incident Management & IT Forensics - Mar 12 - 14, 2013
- CTIN 2013 Digital Forensics Conference - Seattle, WA - Mar 13 - 15, 2013
- SANS Secure Canberra 2013 - Canberra, Australia - Mar 18 - 23, 2013
- SANS Monterey 2013 - Monterey, CA - Mar 22 - 27, 2013
- SANS Northern Virginia 2013 - Reston, VA - Apr 8 - 13, 2013
- SANS Cyber Guardian 2013 - Baltimore, MD - Apr 15 - 20, 2013
- SANS Secure Europr 2013 - Amsterdam, Netherlands - Apr 15 - 27, 2013
- SANS CDK Seoul 2013 - Seoul, Korea, Republic of - Apr 22 - 27, 2013
- SANS Security West 2013 - San Diego, CA - May 9 - 14, 2013
- SANS Austin 2013 - Austin, TX - May 19 - 24, 2013
- International Workshop on Cyber Crime - San Francisco, CA - May 24, 2013
- Techno Security and Forensics Investigation Conference - Myrtle Beach, SC - Jun 2 - 5, 2013
- Mobile Forensics World - Myrtle Beach, SC - Jun 2 - 5, 2013
- SANS Malaysia @ MCMC 2013 - Jun 3 - 8, 2013
- ADFSL 2013 Conference on Digital Forensics, Security and Law - Richmond, VA - Jun 10 - 12, 2013
- FIRST Conference - Bangkok, Thailand - Jun 16 - 21, 2013
- The 1st ACM Workshop on Information Hiding and Multimedia Security - Jun 17 - 19, 2013
- Shakacon V - Honolulu, Hawaii - Jun 25 - 28, 2013
- SANS Digital Forensics and Incident Response Summit 2013 - Austin, TX - Jul 9 - 10, 2013
- 28th IFIP TC-11 SEC 2013 International Information Security and Privacy Conference Auckland, New Zealand - Jul 8 - 10, 2013
- Symposium On Usable Privacy and Security Newcastle, United Kingdom - Jul 24 - 26, 2013
Call For Papers:
- GrrCON - Due June 1 2013
By Ira Victor, G2700, GCFA, GPCI, GSEC, ISACA CGEIT CRISC. Ira Victor is a forensic analyst with Data Clone Labs, He is also Co-Host of CyberJungle Radio, the news and talk on security, privacy and the law. Ira is President of Sierra-Nevada InfraGard, and a member of The High Tech Crime Investigator's Association (HTCIA). Follow Ira's security and forensics tweets: @ira_victor.