Quantcast

Latest Department of Defense Cyber Crime Center Stories

2013-03-23 23:01:06

Civil and Criminal investigations are complex requiring both traditional private investigative work as well as digital investigations encompassing computer forensics, mobile device forensics,

2013-03-08 23:03:31

When it comes to unraveling a mystery today, chances are some of the answers, if not all, will be found in digital form.

2013-03-04 23:01:41

USB sticks can be convenient and practical for many things, but they can also be a devastatingly effective way for attackers to bypass cyber security measures on segmented or non-Internet facing

2013-03-03 23:00:32

Intellectual property theft whether perpetrated by an external hacker or by an internal employee can cause irreparable harm to a company.

2013-02-22 23:03:00

Most of the time organizations like to stay as hush-hush as possible when it comes to being the victim of a cyber attack, but sometimes, the victim has the weaponry to send a salvo of their own

2013-01-05 05:01:14

Network Investigation and Analysis has been a hot topic in Cyber Investigation, with the latest APAC cyber investigations training conference including Network Forensics as part of their training


Word of the Day
sudarium
  • A handkerchief.
  • Specifically— The legendary sweat-cloth; the handkerchief of St. Veronica, according to tradition miraculously impressed with the mask of Christ; also, the napkin about Christ's head (Johu xx. 7).
  • In general, any miraculous portrait of Christ.
The word 'sudarium' comes from a Latin word meaning 'a handkerchief'.