A round-up of this week’s digital forensics news and views:
Who are the ransomware gangs wreaking havoc on the world’s biggest companies?
It’s the defining cyber crime of the 2020s, and hackers are only just beginning to exploit its potential to make money and sow mayhem…
Revocation of Consent to Search Mirror Image of Laptop
In State v. McDonnell … the Supreme Court of Maryland held that a person who had consented to seizure of his laptop, as well as to creation of a mirror image, could withdraw consent to search it before the government examined the data…
Acquisition from a Cloud-based Service Provider
The CCTV Acquisition series continues here with another instalment. This post features an acquisition from a cloud-based service provider…
Orange County DA creates digital forensics unit
The Orange County District Attorney’s office now has a specialized unit dedicated to searching for and analyzing digital evidence retrieved from devices such as cell phones, computers, and vehicles…
How To Get The Upper Hand In A Constantly Evolving Digital World Through Mobile Forensic Training
In today’s digital age, technology is advancing at an unprecedented pace. With new mobile devices and applications being released daily, it is essential for law enforcement agencies to stay up to date with the latest hardware and software to effectively investigate digital evidence…
NITDA, CIFCFIN To Combat Cybersecurity Threats Via Digital Forensics
The director-general of the National Information Technology Development Agency (NITDA), Mallam Kashifu Abdullahi, has assured the president of the Chartered Institute of Forensic and Certified Fraud Investigator of Nigeria (CIFCFIN) of NITDA’s readiness to collaborate with the institute on digital forensics…
Gilgo Beach murders: From burner phones to Tinder profile, full list of evidence cops had to arrest Rex Heuermann
On Thursday, July 13, the 59-year-old architect Rex Heuermann was arrested over suspicion of being connected to the Gilgo Beach murders…
Threat Combat, Academic City University holds cyber incident response and digital forensics public lecture
In a ground-breaking collaboration between Threat Combat and Academic City University, an extraordinary event took place at the prestigious Technology and Entrepreneurship Centre…
Artifacts || PsExec Execution
Today we will see what Artifacts we can discover when Threat Actor use PsExec in Post-Exploitation stage in network…