#digital-forensics

[ follow ]
#deepfakes
World news
fromwww.bbc.com
4 days ago

How dark web agent spotted bedroom wall clue to rescue girl from years of harm

Investigators identify child-abuse victims on the dark web by analyzing minute visual clues and collaborating with platforms despite heavy obfuscation.
US news
fromwww.npr.org
1 week ago

How the FBI might have gotten inaccessible camera footage from Nancy Guthrie's house

FBI recovered Nest doorbell footage showing a masked person; recovery appears to involve backend residual data and may be affected by tampering or subscription status.
fromFortune
1 week ago

Law enforcement thought Nancy Guthrie's smart camera was disconnected, but Google Nest still had the tape | Fortune

Tuesday's release of video surveillance footage showing an armed, masked person at Nancy Guthrie's doorstep on the night she was abducted has raised a host of questions about why it took so long to publicly release, how it was retrieved and what it means for privacy. The process involved days of searching, the FBI said, after law enforcement initially believed the footage was lost because the camera was disconnected and Guthrie didn't have a subscription to the camera company.
US news
#missing-person
Information security
fromComputerworld
2 weeks ago

This is why high-value targets should use Lockdown Mode

Apple's Lockdown Mode prevented the FBI from accessing a seized iPhone, demonstrating strong protection against physical wired extraction attempts.
fromMail Online
2 weeks ago

Smartphones are now the most crucial piece of evidence in crime probes

Smartphones are now the most crucial source of digital evidence in solving nearly every criminal investigation, a report has found. Detectives rely on the wealth of information held on the devices in 97 per cent of cases - double the number in which data from laptops was needed. With the devices containing swathes of detailed messages, photos and location data, police chiefs told the Mail the devices had become 'a crime scene in your pocket'.
Digital life
US news
fromBoston.com
2 weeks ago

Former North Shore police officer gets prison time for child porn charge

Alexander Aiello, a former Gloucester police officer, was sentenced to four years in prison and five years' supervised release for receipt of child pornography.
California
fromABC7 San Francisco
3 weeks ago

Former Antioch mayoral candidate charged with murder 10 years after wife's death deemed a suicide

Former Antioch mayoral candidate charged with murder in his wife's 2015 death after reclassification from suicide based on digital forensic evidence.
Tech industry
fromDataBreaches.Net
4 weeks ago

INC ransomware opsec fail allowed data recovery for 12 US orgs - DataBreaches.Net

Researchers recovered data stolen by the INC ransomware gang from a dozen U.S. organizations after an operational security failure exposed attacker infrastructure.
New York City
fromFast Company
1 month ago

Digital ticketing was supposed to stop fraud, but ticket scams have gotten worse-just ask Taylor Swift

A 28-year-old ran over 1,000 fake ticket ads, defrauding more than 100 buyers and moving $120,000 through Venmo and Zelle.
Information security
fromTheregister
1 month ago

Accused data thief dumped laptop in river to evade justice

A former Coupang employee stole a security key, accessed data on 33 million customers, retained details for about 3,000 accounts, then deleted the stolen data.
fromtechcrunch.com
1 month ago

How a Spanish virus brought Google to Malaga | TechCrunch

After 33 years, Bernardo Quintero decided it was time to find the person who changed his life the anonymous programmer who created a computer virus that had infected his university decades earlier. The virus, called Virus Malaga, was mostly harmless. But the challenge of defeating it sparked Quintero's passion for cybersecurity, eventually leading him to found VirusTotal, a startup that Google acquired in 2012. That acquisition brought Google's flagship European cybersecurity center to Malaga, transforming the Spanish city into a tech hub.
Information security
#ice
fromWIRED
2 months ago
Information security

ICE Seeks Cyber Upgrade to Better Surveil and Investigate Its Employees

fromWIRED
2 months ago
Information security

ICE Seeks Cyber Upgrade to Better Surveil and Investigate Its Employees

Information security
fromTheregister
2 months ago

NHS tech supplier probes cyberattack on internal systems

DXS International experienced a contained cyberattack on office servers with minimal product impact while forensic and regulatory investigations proceed.
fromOregon ArtsWatch * Arts & Culture News
2 months ago

Deschutes Public Library closes in wake of cyberattack, in abundance of caution * Oregon ArtsWatch

When the library system's IT department detected suspicious activity on one of the library's servers Thursday morning, staff immediately "turned off the server in the middle of this happening," as well as shut down all remote access to the library's computer systems, library director Todd Dunkelberg said. "That stopped all activity," Dunkelberg said Friday about the cyberattack, which was first reported by KTVZ, as well as Oregon Public Broadcasting.
Information security
fromBoston.com
2 months ago

Livestream: Day 2 of Brian Walshe's murder trial

Walshe is standing trial for allegedly killing his wife, Ana, on New Year's Day 2023. Prosecutors say he dismembered her body and dumped her remains in dumpsters around the region, including one near his mother's home. Investigators never found her body. In the days after her disappearance, they say Walshe repeatedly misled police as searches stretched from the couple's Cohasset neighborhood to Washington, D.C., where Ana worked.
US news
Information security
fromSecuritymagazine
3 months ago

Determining the Credibility of Online Threats in a World of Digital Noise

Online threats range from pranks to genuine danger; credible threats show specific details, digital breadcrumbs, and behavioral patterns that enable law enforcement intervention and prevention.
fromIT Pro
3 months ago

What is memory forensics?

Memory forensics is the acquisition and analysis of a system's random access memory (RAM). It provides visibility into transient information that is otherwise absent from persistent storage. This includes kernel structures, process execution trees, loaded DLLs, active network sockets, in-memory registry hives, and injected code segments. Over the years, memory forensics has become a major plank of cybersecurity research, becoming crucial for functions such as discovering stealthy malware like or other sophisticated cyber attacks.
Information security
fromTheregister
4 months ago

Crossed wires derailed a UK child abuse case for months

Details have emerged of a troubling case in which a basic engineering mistake wrecked a digital evidence investigation and led to wrongful accusations. An open judgment [PDF] published by the UK's Investigatory Powers Tribunal, which is responsible for investigating claims of British authorities illegally abusing their powers during the course of an investigation, detailed the impact on three people wrongly accused of child sex offences.
Privacy professionals
Information security
fromDataBreaches.Net
4 months ago

The Alliance That Wasn't: A Critical Analysis of ReliaQuest's Q3 2025 Ransomware Report - DataBreaches.Net

No verifiable evidence exists that LockBit, DragonForce, and Qilin formed an alliance; claims are speculative and unsubstantiated.
Miscellaneous
fromIndependent
5 months ago

Gardai fear missing boy was killed up to four years ago and his remains were hidden

Investigators suspect a north Dublin boy may have been killed up to four years ago with his death concealed and remains hidden.
fromIndependent
5 months ago

Gardai analysing texts between man and woman in Kyran Durnin investigation

Technical experts are focusing on messages from around the time the boy disappeared
Miscellaneous
Privacy professionals
fromWIRED
7 months ago

CBP Wants New Tech to Search for Hidden Data on Seized Phones

CBP is seeking advanced digital forensics tools for analyzing data from electronic devices at the U.S. border.
fromArs Technica
8 months ago

Worst hiding spot ever: /NSFW/Nope/Don't open/You were Warned/

Captain Samuel White approved a search of Bartels' gear, leading to revelations of illegal activities including possession of CSAM and buying it while stationed at Guantanamo.
Privacy technologies
Artificial intelligence
fromBusiness Matters
8 months ago

House of Lords AI summit at London Tech Week warns of 'skills cliff edge' threatening UK's competitive future

The UK faces a potential skills gap in adapting to AI advancements.
Accelerating AI literacy is crucial to remain competitive internationally.
A united AI strategy is needed across industries.
Tech industry
fromTheregister
8 months ago

Cellebrite gets virtual with $170M Corellium buy

Cellebrite acquires Corellium for $170 million, enhancing its capabilities in digital forensics and security research.
#karen-read
fromBoston.com
9 months ago
Boston food

Livestream: Testimony continues in Karen Read murder retrial

Karen Read is on trial for allegedly murdering Boston Police Officer John O'Keefe, with complexities surrounding evidence and differing accounts of events.
fromBoston.com
9 months ago
Boston food

Livestream: Cellebrite expert expected back on the stand in Karen Read murder trial

Digital forensics evidence from Ian Whiffin complicates the defense's narrative in Karen Read's murder retrial.
Boston food
fromBoston.com
9 months ago

Livestream: Testimony continues in Karen Read murder retrial

Karen Read is on trial for allegedly murdering Boston Police Officer John O'Keefe, with complexities surrounding evidence and differing accounts of events.
[ Load more ]