A round-up of this week’s digital forensics news and views:
Hunted, UK Reality TV Show, Uses Oxygen Forensic® Detective To Hunt Contestants
Hunted and Celebrity Hunted is a reality TV show where 14 individuals attempt to evade capture by a team of expert “Hunters” made from various investigative professionals: police officers, military personnel, and digital forensic experts…
Researchers fight cybercrime with new digital tools and techniques
In the never-ending cybersecurity war, Irfan Ahmed, Ph.D., provides the good guys with digital forensic tools—and the knowledge to use them…
E-Discovery Disrupted by the AI Revolution
The world’s ever-growing tsunami of digital data creates a huge need for technology capable of filtering it for modern e-discovery processes. So, what’s the best tool for the job…?
Read More (Legal Talk Network)
CDS Defence and Security launches digital forensics lab to reduce law enforcement digital backlog
Cheltenham-headquartered defence consultancy, CDS Defence and Security (CDS DS) — part of Bailie Group — has launched its new digital forensics lab (DFU) at its Government-approved facility…
Read More (Business & Innovation Magazine)
Tackling Time In Digital Investigations – Succeeding When Seconds Matter
Time and our relation to this relative concept are at the center of all high-tech crime investigations. Despite being at the center, an examiner may have misunderstandings about the time stamp they see before them…
Computer forensics expert speaks out on Lindell’s election fraud ‘proof’
The founder and CEO of MyPillow, Mike Lindell, is being ordered to pay five million dollars to a computer forensics expert from Nevada, stemming from a challenge issued at Lindell’s “Cyber Symposium”…
Analysis of Digital Information in Storage Devices Using Supervised and Unsupervised Natural Language Processing Techniques
Due to the advancement of technology, cybercrime has increased considerably, making digital forensics essential for any organisation…
Incident Response Rapid Triage: A DFIR Warrior’s Guide (Part 2 – Incident Assessment and Windows Artifact Processing)
In Part 2 of this series, I will delve into the process of thoroughly evaluating the incident, explore a non-exhaustive list of system analysis goals, and lead into the rapid processing of the acquired critical Windows endpoint artifacts…
Analyzing iPhone PINs
In recent years, Apple had switched from 4-digit PINs to 6 digits, while implementing blacklists of insecure PIN codes. How do these measures affect security, how much more security do six-digit PINs deliver compared to four-digit PINs, and do blacklists actually work…?
Cyber thieves target new victims with more sophisticated card-skimming devices
In the 1980’s, as personal computers were just starting to appear in homes across the country, Perez was a young boy who found tinkering with technology much more entertaining than toys. By the time he was 12 years old, he was building his own computers…