Alert Logic published a widely publizised blog outlining a common configuration problem with Polk ...(more)...
Researchers at Palo Alto found that many ROM images used for Android smart phones manufactured by ...(more)...
In previous diaries we have talked about memory forensics and how important it is.
In t ...(more)...
In October, Apple released Security Update 2014-005, specifically with the intend to address the ...(more)...
This attack got it all, and shows how hard it can be for a non ISC reader to evade some of these ...(more)...
Hi, we are the authors of The Art of Memory Forensics and the core Volatility developers. We are here to answer your questions about the book, Volatility and memory forensics in general. We are looking forward to your questions!
About the Book:
The Art of Memory Forensics is over 900 pages of memory forensics and malware analysis across Windows, Mac, and Linux. The first four chapters provide background information for people without systems and forensics backgrounds while the rest of the book is a deep dive into the operating system internals and investigative techniques necessary to detect and combat highly skilled adversaries and advanced malware.
The book's authors are the core Volatility developers and have all been involved in memory forensics since the mid-2000s.
Michael Ligh is the author of Malware Analyst's Cookbook and specializes in malware reverse engineering.
Andrew Case is the co-author of Registry Decoder and spends most days performing incident response.
Jamie Levy is a former Computer Science Professor and one of the earliest Volatility contributors.
Official Page - includes a free download of associated memory samples and analysis labs
Thank you for all the questions and kind words about the book, and thank you to the mods for hosting our AMA! We will be checking this thread periodically for the next day or so, and if you have questions after that feel free to reach out on Twitter or email.
Today Sony canceled the premiere of “The Interview” and its entire Christmas-Day release of the movie because of fears that terrorists might attack theaters showing the film. The actions show just how much power the attackers behind the Sony hack have amassed in a short time. But who exactly are they? 1 The New York […]
The post The Evidence That North Korea Hacked Sony Is Flimsy appeared first on WIRED.
The plot of the Sony hack drama has taken a new turn. Two former employees of Sony Pictures Entertainment filed a class-action lawsuit against the studio giant on Monday for failing to properly secure sensitive employee data. The recent widespread breach of Sony has resulted in the theft and release of documents exposing Social Security […]
The post Former Employees Are Suing Sony Over ‘Epic Nightmare’ Hack appeared first on WIRED.
The FBI relied on Flash code from an abandoned Metasploit project called "Decloak" to identify suspects hiding behind the Tor anonymity network.
The post The FBI Used the Web’s Favorite Hacking Tool to Unmask Tor Users appeared first on WIRED.
When it comes to protecting data privacy, Microsoft has allies. More than 75 civil liberties groups, technology companies, trade associations and computer scientists filed legal briefs today in support of the software giant, who is fighting to protect the privacy of data stored overseas from the prying eyes of the U.S. government. The uncommon support […]
The post Tech Giants Rally Around Microsoft to Protect Your Data Overseas appeared first on WIRED.
As leaks from the recent Sony hack continue to make headlines and company executives apologize for insensitive comments made in exposed emails, we still don’t know how the hack occurred or the exact nature of the demands made by the attackers. But we’ve learned a bit about Sony’s security practices. And we’ve learned that the attackers may have tried to extort Sony before releasing its secrets. We’ve also learned that attempts by Sony to rally public support from rival studios has failed.
The post Sony Hackers Threaten to Release a Huge ‘Christmas Gift’ of Secrets appeared first on WIRED.
When alleged Silk Road mastermind Ross Ulbricht’s trial begins in less than a month, he’ll face charges of narcotics conspiracy, money laundering, and computer fraud—not murder. But the specter of violence is creeping into Ulbricht’s trial nonetheless. The prosecution and judge in his case have now refused to let him know which witnesses will be […]
The post Silk Road Judge: I Won’t Reveal Witnesses Because Ulbricht Could Have Them Killed appeared first on WIRED.
Even as President Obama denounces the “enhanced interrogation” employed by the CIA and outlined in a scathing Senate report, his administration continues blocking the release of some 2,100 photographs taken in Iraq and Afghanistan depicting alleged torture.
The post The War Over the US Government’s Unreleased Torture Pictures appeared first on WIRED.
TL;DR: A backdoor in software or a computer system is generally an undocumented portal that allows an administrator to enter the system to troubleshoot or do upkeep. But it also refers to a secret portal that hackers and intelligence agencies use to gain illicit access. A backdoor has multiple meanings. It can refer to a […]
The popular file-sharing service Pirate Bay was taken down today following a raid in Sweden by police who seized servers and computers. The Pirate Bay portal went down Tuesday morning after Swedish police raided a server room in Stockholm over alleged copyright violations. In addition to its file-sharing section, Pirate Bay’s forum Suprbay.org was also […]
The post Pirate Bay Has Been Raided and Taken Down: Here’s What We Know appeared first on WIRED.
The Europeans are no less determined than the US to secure its borders, relying on everything from drones and unmanned ships to guys in zeppelins to protect itself from those who hope to sneak in from North Africa, the Middle East and elsewhere.
The post Satellites and Zeppelins: Serious Tech Helps Europe Lock Down Its Borders appeared first on WIRED.