A round-up of this week’s digital forensics news and views:
‘The audio gets to you’: What it takes for Singapore police to investigate child sexual abuse material
For a few hours every day, Assistant Superintendent of Police (ASP) Jane Chen has to look at horrendous, obscene imagery: Video footage and pictures of children, some as young as a few months old, being sexually abused…
Automation for Digital Forensics: Towards a definition for the community
With the increasing amount of digital evidence per case, the automation of investigative tasks is of utmost importance to the digital forensics community…
We all have computers — so why do we still struggle with digital evidence?
Our world is awash with data and, given the sheer volume of digital artefacts out there, it’s only natural that some end up as crucial exhibits in court…
Google Workspace Log Extraction
In parts 1 and 2 of our series on cloud log extraction, we discussed how to retrieve high-value logs from Google Cloud and AWS. In this post, we are going to take a look at Google Workspace…
Incident Response: Bring Out The Body File
An Incident Response (IR) examiner faced with a case or asked whether something ‘funny’ or ‘bad’ happened on a host will wonder if a comprehensive file listing is attainable for the system in question…
The Use of Digital Forensic Software in Investigating Crimes Against Children
Digital forensic software is a powerful investigative tool that law enforcement and investigators have turned to for solving crimes against children…
Types Of Devices Examined In Digital Forensics Investigations
Today, digital forensic investigators must be adept at extracting evidence from an array of devices, each with unique structures, operating systems, storage capabilities, and security features…
NOUN trains DSS, Army, others in digital forensics to tackle cybercrime
The National Open University of Nigeria has commenced training for security personnel on the adoption of digital forensics in order to curtail insecurity and cybercrimes in the country…
Digital dumpster diving: Exploring the intricacies of recycle bin forensics
In the vast realm of digital investigations, there exists a fascinating technique known as recycle bin forensics. Delving into the depths of this captivating field unveils a world where seemingly deleted files can still reveal their secrets, allowing digital detectives to reconstruct user activities and uncover valuable information…
Read More (AT&T Cybersecurity)
‘INEC deleted results on BVAS machines’, Atiku’s witness tells presidential election court
A witness for the Peoples Democratic Party (PDP) and its presidential candidate, Atiku Abubakar, has told the Presidential Election Petition Court in Abuja that results on all 110 BVAS machines he inspected were deleted…
Cybercrime reaches unprecedented levels: 90 million attacks per year costing 10.5 trillion euros
One in five crimes in Spain is committed online, which will generate 150,000 complaints by 2025. “Every day there are 90 million cyberattacks in the world [more than a thousand per second] that represent a cost of 10.5 trillion euros”, warns María Jesús Almanzor, CEO of Cybersecurity and Cloud at Telefónica Tech…
Bihar government expands police network to curb spike in cybercrime
The arrest of two young men from Bihar for their involvement in the alleged CoWIN data leak is not an aberration. Faced with the growing menace of cybercrime that spiked during the pandemic and counts even the State’s Chief Secretary among the targets, the Bihar government has opened 44 cyber police stations…