Not long ago, the legal department at a financial services company in New York got a phone call from a hospital in London. The query: Why are you hacking us? With two known IP addresses, it wasn’t difficult for the financial firm’s information security staff to go back through the logs looking for traffic between the two organizations. And with the traffic identified, locating the computer from which the hacks were taking place didn’t take long, either. The culprit: an individual who—as their human resources records soon confirmed—had formerly worked at that very hospital. Ah, the good old days…
Uncover Evidence With XAMN, the Best Digital Forensic Analysis Solution
Cyacomb's Graham Little & Mike Burridge on Making the Online World a Safer Place
Rainbowboy: How the Mobile IT-Forensic Laboratory Helps German Police Solve Their Cases Faster
Important: No API Key Entered.
Many features are not available without adding an API Key. Please go to the YouTube Feed settings page to add an API key after following these instructions.