Interview with Professor Golden G. Richard III, University of New Orleans
Golden, can you tell us something about your background and why you decided to teach digital forensics? I studied computer science at the University of New Orleans, then went to Ohio State to get an...
View ArticleAn Introduction to Penetration Testing – Part 1
by Si Biles In an earlier article, many moons ago (Sorry Jamie !), I stated my opinion that Forensics and Security were opposite sides of the same coin. I’ve felt very strongly that my skills as a...
View ArticleInterview with John H. Riley, Bloomsburg University of Pennsylvania
John, can you tell us something about your background and why you decided to teach digital forensics? First, thanks for the opportunity to discuss our program. We're really proud of what we've...
View ArticleIntroduction to Penetration Testing – Part 2 – The Discovery Phase – Passive...
by Si Biles ( @si_biles ), consultant for Thinking Security PenTest, like forensics, is almost as much an art as it is a science – you can only be taught so far, technical techniques and tools are all...
View ArticleParallels hard drive image converting for analysis
by zoltanszabodfw The other day, talking to one of the analysts in Dallas, a question emerged about analyzing Parallels’ virtual machine hard drives. To my surprise, I did not find many help on this...
View ArticleRetrieving Digital Evidence: Methods, Techniques and Issues
by Yuri Gubanov yug@belkasoft.com Belkasoft Ltd. http://belkasoft.com This article describes the various types of digital forensic evidence available on users’ PC and laptop computers, and discusses...
View Article"Finding Evidence in an Online World" webinar recording and PDF now available
A recording of this week's webinar "Finding Evidence in an Online World - Trends and Challenges in Digital Forensics" is now available here and on YouTube here. Sincere thanks to Jad Saliba for...
View ArticleAuthenticating Internet Web Pages as Evidence: a New Approach
By John Patzakis [1] and Brent Botta [2] Previously, in Forensic Focus, we addressed the issue of evidentiary authentication of social media data (see previous entries here and here). General Internet...
View ArticleIntroduction to Penetration Testing – Part 3a – Active Reconnaissance
by Si Biles, Thinking Security Apologies in advance, this is a bit of a connective blog entry – this is a big topic, and it needs some scene setting, basic understanding and several weeks worth to get...
View ArticleBook Review: Mastering Windows Network Forensics & Investigations
by Chad TilburyMastering Windows Network Forensics and Investigations fills an interesting niche not well addressed in the pantheon of digital forensics resources. The material is well suited for...
View ArticleForensic Examination of FrostWire version 5
As digital forensic practitioners, we are faced regularly with users utilizing the internet to swop and download copyrighted and contraband material. Peer to peer (P2P) applications are commonly used...
View ArticleResearchers Show How to Crack Android Encryption
As forensic examiners, some of the last things we want to hear are "encryption" and "enabled" in the same sentence, however that's what has been happening with the current line of Android devices....
View ArticleApple phones are AES-tough, says forensics expert
Monday's Technology Review carries a glowing tribute to Apple iPhone security according to its author, Simson Garfinkel, a contributing editor who works in computer forensics and is highly regarded as...
View ArticleWebinar: Windows 8 Forensics - A First Look
Take a first look at Windows 8 forensics in a webinar presented by Josh Brunty, Assistant Professor of Digital Forensics at Marshall University. Learn about the changes in Windows 8 which forensic...
View ArticleGenerating computer forensic supertimelines under Linux: A comprehensive...
When the authors first published this paper, their intentions were to develop a comprehensive guide to digital forensic timelines in order to consolidate the many fragmented sources of information...
View ArticleComputer Analysts and Experts – Making the Most of GPS Evidence
by Professor David Last The many companies that sell software for computer forensics have developed products for analysing satellite navigators. Police high tech crime units and independent...
View ArticleJADsoftware - The Company Behind IEF - Re-Launches As Magnet Forensics Inc.
JADsoftware, the company behind the industry-leading digital forensics product Internet Evidence Finder (IEF), announced on Monday that they have re-launched the company under a new name - Magnet...
View ArticleWindows 8 Forensics webinar - alternative URL
Sincere apologies to anyone having difficulty connecting to the Meetingburner service to view the Windows 8 Forensics presentation - please try the following URL on YouTube...
View ArticleInterview with Philip Anderson, Senior Lecturer at Northumbria University
Philip, can you tell us something about your background and why you decided to teach digital forensics? I graduated from Northumbria University with a BSc (Hons) in Business Information Technology in...
View ArticleInterview with Lindy Sheppard, F3 (First Forensic Forum) Secretary
Lindy, tell us something about the cases you have been involved in. I have been involved in quite a variety of cases, from counter terrorism to the importation of drugs, fraud, missing children and...
View Article
More Pages to Explore .....