A round-up of this week’s digital forensics news and views:
Partnering on cybercrime is taking the fight against cyber threats to new levels
In January 2023, the World Economic Forum’s Partnership Against Cybercrime members launched the Cybercrime Atlas initiative to map and better understand the cybercriminal ecosystem…
Read More (World Economic Forum)
Keeping Deepfakes Out of Court May Take Shared Effort
Court officials anticipate having messy debates over whether evidence is authentic or fabricated, with deepfakes skewing jurors’ decisions and digital forensics analysts helping to find the truth…
Read More (Government Technology)
Bootloader Unlocking a Google Pixel 6
Unlocking the bootloader on a device is a process that allows you to gain access to the device’s system files and make changes that are typically restricted by the manufacturer…
Hoover ready for $23 million upgrade to National Computer Forensics Institute
We’re getting closer to a more than $20 million expansion for the National Computer Forensics Institute in Hoover. This is all thanks to a federal grant first announced about a year ago…
Hunting for File Deletion Artifacts in Google File Stream Data
Recently, I’ve been delving deep into a little forensic goldmine known as Google Drive for Desktop. Specifically, the feature Google Drive File Stream and the glorious nuggets it leaves behind…
Empowering Law Enforcement With Nick Harvey From Cellebrite
Nick Harvey, a former Detective Inspector in the Metropolitan Police, discusses his transition from law enforcement to his current role as a Customer Success Manager at Cellebrite…
The cost of cybercrime to reach over $12tn by 2025
External market figures suggest that the cost of cybercrime is predicted to reach over $12tn by 2025, and the growth of cyber-attacks has been consistent, as reported by several security providers…
Read More (Computer Crime Research Center)
Evidence of Program Existence – Shimcache
Another fantastic Windows intrusion analysis artifact! Shimcache! Although this artifact is heavily used in intrusion analysis cases, it is also one of the most misunderstood. Lets break this down and talk all things Shimcache…
Defence accuses cops of manufacturing phone evidence
One of the lawyers representing Portland businessman Everton ‘Beachy Stout’ McDonald has suggested that the police manufactured phone evidence to establish that there were secretly recorded conversations between the businessman and a contract killer on his phone…
New research combats burgeoning threat of deepfake audio
With every passing day, it seems like it is getting harder to trust what you see—and hear—on the internet. Deepfakes and doctored audio have become easier to create with the press of a button…
Russian National Sentenced for Involvement in Development and Deployment of Trickbot Malware
A Russian national was sentenced yesterday to five years and four months in prison for his involvement in developing and deploying the malicious software known as Trickbot, which was used to launch cyberattacks against American hospitals and other businesses…
Read More (Office of Public Affairs)
Cybercriminals crave cookies, not passwords
All cookies are vulnerable, but they are all it takes to compromise Google or other accounts, Trevor Hilligoss, former FBI digital crime expert and current Vice President of SpyCloud Labs, warns. This was proven by the recently discovered OAuth vulnerability…
Microsoft Says Test Account Gave Hackers Keys to the Kingdom
A “consistent and persistent” nation-state hacking group run by Russian intelligence breached Microsoft’s cloud-based email by using a test account to authorize a custom-built malicious application…
NCSC warns ransomware attacks to intensify due to AI
The number of cyberattacks will “almost certainly” increase in the next two years as artificial intelligence lowers the entry barrier for less skilled hackers, Britain’s cyber chiefs say…
City cyber wing gets advanced tools, training to fight crimes
Thiruvananthapuram: The city cybercrime wing is being equipped with some of the most advanced tools as part of the initiative to strengthen it in view of the increasing cybercrimes…