Increasingly, chains of evidence include software steps. It’s not just the RIAA suing people – and getting it wrong – based on automatic systems to detect and identify file sharers. It’s forensic programs used to collect and analyze data from computers and smart phones. It’s audit logs saved and stored by ISPs and websites. It’s location data from cell phones. It’s e-mails and IMs and comments posted to social networking sites. It’s tallies from digital voting machines. It’s images and meta-data from surveillance cameras. The list goes on and on. We in the security field know the risks associated with trusting digital data, but this evidence is routinely assumed by courts to be accurate…
Latest Videos
Kickstarting Your Digital Forensics Cybersecurity Career
Digital Forensics News Round Up, March 27 2024 #dfir #digitalforensics
Digital Forensics News Round-Up, March 21 2024 #digitalforensics #dfir
This error message is only visible to WordPress admins
Important: No API Key Entered.
Many features are not available without adding an API Key. Please go to the YouTube Feeds settings page to add an API key after following these instructions.