Quantcast
Channel: Forensic Magazine
Browsing all 46 articles
Browse latest View live

Computational and Mathematical Techniques for Authenticating Digital Media

In this NIST Colloquium Series presentation, Dr. Hany Farid discusses the impact that camera manipulation and alteration have caused, focusing on digital tampering and manipulation, techniques for...

View Article



Copy Machines, a Security Risk?

Armen Keteyian reports on the vast amount of data on photocopier hard drives which store images of every document scanned, copied, or emailed by the machine. From: CBSRead more about Copy Machines, a...

View Article

UAB Fights Cybercrime Nationwide

He may not be able to leap tall buildings in a single bound, but Gary Warner, the director of research in computer forensics at the University of Alabama at Birmingham, helps nab cybercriminals faster...

View Article

3 Weeks Left in the 2010 DC3 Digital Forensics Challenge

As we start the month of October, we grow closer to the November 2nd, 2010 Challenge submission deadline. The 2010 DC3 Challenge already has over 30 teams with partial and full submissions. With over...

View Article

Encase: Locating the MFT from the Volume Boot

Here's how to locate the MFT and MFT Mirror from the Volume Boot, using EnCase. From: whereisyourdataRead more about Encase: Locating the MFT from the Volume BootComments

View Article


Advanced Post Exploitation with Rootkits

This is mainly a post-exploitation demonstration that first starts with a walk-through of exploiting a Windows machine. Next, we walk through getting a copy of the Web server's home page and then...

View Article

A Geek's Guide to Digital Forensics

This talk will provide a technical introduction to digital forensics geared towards fellow geeks who think tinkering with data in hex is fun and interesting. The talk will provide a brief background on...

View Article

NIST Colloquium Series: Digital Forensics

Dr. Hany Farid, a distinguished professor at Dartmouth College and the "father" of digital image forensics, is an expert on authenticating images. His most famous analysis: a photograph of Lee Harvey...

View Article


Futures Exploration at the CDFAE

Read more about Futures Exploration at the CDFAEComments

View Article


Acceptability of Digital Evidence

Gary Kessler explores the acceptability of digital evidence in court as regards the Federal Rules of Evidence.Read more about Acceptability of Digital EvidenceComments

View Article

Unboxing Digital Forensics Equipment with Google Glass

Read more about Unboxing Digital Forensics Equipment with Google GlassComments

View Article

Stealing Money from ATMs with Malware

Read more about Stealing Money from ATMs with MalwareComments

View Article

Ditto Forensic FieldStation Overview

The CRU Ditto Forensic FieldStation combines special-purpose computing hardware, capable of fast analysis, and carefully selected duplication of attached hard drive data. It has all of the classic...

View Article


Talk Forensics - Warrants

In the first part of our Digital Evidence Series, we’ll be discussing Warrants as they apply to cell phones, computers, and other types of digital evidence. These types of evidence require a different...

View Article

Talk Forensics - Packaging Mobile Devices

Today we’ll be discussing the collection and packaging of cell phones and other mobile devices. Proper packaging is essential to preserve the sometimes volatile electronic evidence these devices...

View Article


2014 Cyber Shield Exercise Sharpens Guard Cyber Warriors

Read more about 2014 Cyber Shield Exercise Sharpens Guard Cyber WarriorsComments

View Article

Talk Forensics - Validating Your Tools

This edition will look at forensic tool validation. Myriad tools exist for the examination of digital evidence. These tools automate many of the tedious forensic processes and allow you to perform...

View Article


Talk Forensics - Beyond the Tools

Today we’ll be discussing what to do when conventional mobile device extraction tools are unable to extract the evidence you need. When a smartphone is locked, broken, or unsupported by forensic tools,...

View Article

Talk Forensics - Investigations in the Cloud

This edition of Talk Forensics will take a look at forensic investigations in the cloud.  The software and data for cloud applications are stored on servers owned by a third party and not local to the...

View Article

Talk Forensics - Expert Witness Testimony

Today we’ll discuss the challenges of testifying as an expert witness. As you work a case you must assume that you will be called to testify at trial.Read more about Talk Forensics - Expert Witness...

View Article
Browsing all 46 articles
Browse latest View live




Latest Images