Brent Muir published a overview presentation about OS and application forensic artefacts related to Windows 10. Windows 10 Forensics: OS Evidentiary Artefacts from Brent Muir…
Monthly Archives: July 2015
NAS Forensics Explained
Oleg Afonin, Danil Nikolaev & Yuri Gubanov from Belkasoft Research 2015 published a paper, were they had a look at challenges of NAS (network-attaches storage) forensic analysis. All in all an interesting read: http://articles.forensicfocus.com/2015/07/29/nas-forensics-explained…
Free Computer Hacking Forensics Investigation class
The EH Academy published a free computer hacking forensics investigation class. In this class, you can learn the concept of: Computer forensics (why, what and how?) Evidence (what kind of evidence you should look for, how you can get the evidence, what to do with the crime scene, how to handle the situation, how to make…
Cyber security job market is suffering
Cybersecurity job market to suffer severe workforce shortage says CSO. Read more on their website under: http://www.cso.com.au/article/580613/cybersecurity-job-market-suffer-severe-workforce-shortage…
Project Spartan – Forensics artifacts of the new Microsoft browser
Microsoft will soon release its new browser called Microsoft Edge (Codename Spartan). There is already a pre-release available since March 30, 2015. It will be the new standard browser in Windows 10 on PCs, Smartphones and Tablets. James Gratchoff & Gudio Kroon from the University of Amsterdam now published a first research paper that gives…
Hacking Team Android malware could hack 500m Android devices
CSO article about Hacking Team leak: http://www.cso.com.au/article/580316/hacking-team-android-malware-could-hack-500m-android-devices/?utm_medium=rss&utm_source=taxonomyfeed…
Evidence Acquisition and Analysis from Live Exchange
Interesting article from ForensicFocus about the acquisition and analysis of a live Microsoft Exchange environment. http://articles.forensicfocus.com/2015/06/12/evidence-acquisition-and-analysis-from-live-exchange/…
CISSP prep in 60 days – That’s my goal
My summer goal for 2015 is to achieve the CISSP certification (Certified Information Systems Security Professional) governed by the (isc)2 consortium. They claim that the CISSP certification is the ideal credential for those with proven deep technical and managerial competence, skills, experience, and credibility to design, engineer, implement, and manage their overall information security program to…
Guidance Software, Inc. Introduces Tableau Password Recovery
Guidance Software, Inc. is pleased to introduce Tableau Password Recovery, a powerful solution that accelerates dictionary-based and brute force password attacks to unlock protected files including Office 2007, Office 2010, PGP messages, WinRAR and WinZip. Read more: www.guidancesoftware.com/tableaupasswordrecovery…
Webcast: Mobile Chat & Social App Forensics
Magnet Forensics will held another webcast on July 23rd, 2015 about Mobile Chat & Social App Forensics. Time: Thursday, July 23, 2015, 10:00 am (GMT-05.00) Overview: Smartphone apps that allow users to express themselves by messaging, posting, tweeting, liking, commenting, and sharing images and videos, have radically altered communication patterns. This new world of hyper-connected…