Digital Forensics Processing and Procedures
In this excerpt from Digital Forensics Processing and Procedures, the authors provide insight on areas that will need to be considered when setting up a forensic laboratory.
View ArticleGathering forensic data with CrowdResponse
Video: Keith Barker of CBT Nuggets shows how to use CrowdStrike’s security incident response tool, CrowdResponse, to gather forensic information.
View ArticleDigital forensic challenges in a cloud computing environment
Cloud computing creates difficulties for digital forensic investigators.
View ArticleShould data from a corrupted workstation be transferred to a forensics laptop?
If a Windows workstation is compromised, should the information be transferred to a forensics laptop? Or is it better to use USB pen drives or a Windows share? In this expert Q&A, Ed Skoudis...
View ArticleCSRF exploit could tarnish forensics
A former special agent will explain how attackers could take advantage of the vulnerability to muddle ongoing investigations.
View ArticleBlack Hat DC: Feds seek new digital forensic tools
The Defense Cyber Crime Center (DC3) is overwhelmed by the amount of data it must study, and director Jim Christy hopes the private sector can help with better forensic tools.
View Articlecomputer forensics (cyber forensics)
Computer forensics is the application of investigation and analysis techniques to gather and preserve evidence from a particular computing device in a way that is suitable for presentation in a court...
View ArticleBlack Hat 2007: Forensics software security holes revealed
Researchers from iSEC Partners tell the Black Hat 2007 audience that the industry’s leading forensics software is susceptible to attack.
View ArticleWindows registry forensics: Investigating system-wide settings
Information security forensic investigations can be a big job, but Windows registry command tools can make it easier. From querying autostart programs to getting the goods on every USB device ever...
View ArticleHacking forensics: Windows command-line tools for the modern era
It’s a fact of life: Windows systems get hacked. In this tip, expert Nick Lewis discusses multiple Windows command-line tools to help enterprises discover if their system has been compromised.
View ArticleWindows Forensic Analysis Toolkit: Advanced Analysis Techniques for Windows...
In this excerpt of Windows Forensic Analysis Toolkit, author Harlan Carvey discusses what Volume Shadow Copies are and how they affect forensic analysis in Windows 8.
View ArticleHow security market needs transformed Network Flight Recorder
Marcus Ranum’s Network Flight Recorder was poised as a forensics tool when the market demanded IDSes — so it adapted accordingly.
View ArticleHow network forensics analysis tools turn admins into detectives
Network traffic capture, sophisticated analysis and forensics capabilities make network forensics analysis tools useful in making security assumptions and allocating resources.
View ArticleMet Police seeks MSPs as digital forensic investigations move closer to the...
Metropolitan Police Force wants to make it easier for frontline staff to embark on forensic investigations involving digital devices with the help of MSPs
View ArticleHow to preserve forensic evidence in the golden hour after a breach
There is a golden hour at the outset where a clear head and good planning can make or break any subsequent forensic investigation
View ArticleRise of anti-forensics techniques requires response from digital investigators
The rise of cyber threats is putting a strain on those trying to combat the problem but as Nick Booth finds out if you have the right skills these could be lucrative times
View ArticleFour computer forensics books worth investigating
Check out four computer forensics books that can help you learn the ins and outs of computer forensics technology and laws in place to manage cybercrime.
View ArticleHow a computer forensics investigation put two behind bars
A computer forensics investigation lead by a computer-savvy investigator followed a network trail from a murder probe to a digital trove of child pornography.
View ArticleDo’s and don’ts of building a forensics workstation
Elizabeth Genco explains the pros and cons of building a forensics workstation from scratch. Read now to learn what forensic tools are beneficial and which ones aren’t.
View ArticleHow to perform a forensic acquisition of a virtual machine disk
Virtualization expert Paul Henry provides a step-by-step guide to imaging a virtual machine disk (*flat.vmdk) in a forensically sound manner.
View Article