Computational and Mathematical Techniques for Authenticating Digital Media
In this NIST Colloquium Series presentation, Dr. Hany Farid discusses the impact that camera manipulation and alteration have caused, focusing on digital tampering and manipulation, techniques for...
View ArticleCopy Machines, a Security Risk?
Armen Keteyian reports on the vast amount of data on photocopier hard drives which store images of every document scanned, copied, or emailed by the machine. From: CBSRead more about Copy Machines, a...
View ArticleUAB Fights Cybercrime Nationwide
He may not be able to leap tall buildings in a single bound, but Gary Warner, the director of research in computer forensics at the University of Alabama at Birmingham, helps nab cybercriminals faster...
View Article3 Weeks Left in the 2010 DC3 Digital Forensics Challenge
As we start the month of October, we grow closer to the November 2nd, 2010 Challenge submission deadline. The 2010 DC3 Challenge already has over 30 teams with partial and full submissions. With over...
View ArticleEncase: Locating the MFT from the Volume Boot
Here's how to locate the MFT and MFT Mirror from the Volume Boot, using EnCase. From: whereisyourdataRead more about Encase: Locating the MFT from the Volume BootComments
View ArticleAdvanced Post Exploitation with Rootkits
This is mainly a post-exploitation demonstration that first starts with a walk-through of exploiting a Windows machine. Next, we walk through getting a copy of the Web server's home page and then...
View ArticleA Geek's Guide to Digital Forensics
This talk will provide a technical introduction to digital forensics geared towards fellow geeks who think tinkering with data in hex is fun and interesting. The talk will provide a brief background on...
View ArticleNIST Colloquium Series: Digital Forensics
Dr. Hany Farid, a distinguished professor at Dartmouth College and the "father" of digital image forensics, is an expert on authenticating images. His most famous analysis: a photograph of Lee Harvey...
View ArticleFutures Exploration at the CDFAE
Read more about Futures Exploration at the CDFAEComments
View ArticleAcceptability of Digital Evidence
Gary Kessler explores the acceptability of digital evidence in court as regards the Federal Rules of Evidence.Read more about Acceptability of Digital EvidenceComments
View ArticleUnboxing Digital Forensics Equipment with Google Glass
Read more about Unboxing Digital Forensics Equipment with Google GlassComments
View ArticleStealing Money from ATMs with Malware
Read more about Stealing Money from ATMs with MalwareComments
View ArticleDitto Forensic FieldStation Overview
The CRU Ditto Forensic FieldStation combines special-purpose computing hardware, capable of fast analysis, and carefully selected duplication of attached hard drive data. It has all of the classic...
View ArticleTalk Forensics - Warrants
In the first part of our Digital Evidence Series, we’ll be discussing Warrants as they apply to cell phones, computers, and other types of digital evidence. These types of evidence require a different...
View ArticleTalk Forensics - Packaging Mobile Devices
Today we’ll be discussing the collection and packaging of cell phones and other mobile devices. Proper packaging is essential to preserve the sometimes volatile electronic evidence these devices...
View Article2014 Cyber Shield Exercise Sharpens Guard Cyber Warriors
Read more about 2014 Cyber Shield Exercise Sharpens Guard Cyber WarriorsComments
View ArticleTalk Forensics - Validating Your Tools
This edition will look at forensic tool validation. Myriad tools exist for the examination of digital evidence. These tools automate many of the tedious forensic processes and allow you to perform...
View ArticleTalk Forensics - Beyond the Tools
Today we’ll be discussing what to do when conventional mobile device extraction tools are unable to extract the evidence you need. When a smartphone is locked, broken, or unsupported by forensic tools,...
View ArticleTalk Forensics - Investigations in the Cloud
This edition of Talk Forensics will take a look at forensic investigations in the cloud. The software and data for cloud applications are stored on servers owned by a third party and not local to the...
View ArticleTalk Forensics - Expert Witness Testimony
Today we’ll discuss the challenges of testifying as an expert witness. As you work a case you must assume that you will be called to testify at trial.Read more about Talk Forensics - Expert Witness...
View Article
More Pages to Explore .....