Recently, research and news has created a great deal of discussion about hash algorithms and their validity for forensic uses. Over the past several years, the primary hash algorithm used in forensic applications, MD5, has been compromised for use in encryption, a cryptographic use of this mathematical process. The SHA-1 algorithm has been compromised on a theoretical level and attempts proving the theoretical compromise have not yet been successful. The question is then asked, how do these compromises affect their use in forensics?
Digital Forensics News Round Up, February 28 2024 #digitalforensics #dfir
Digital Forensics News Round-Up, February 21 2024 #digitalforensics #dfir
How MSAB Is Managing The Digital Forensics Challenges Of Frontline Policing
Important: No API Key Entered.
Many features are not available without adding an API Key. Please go to the YouTube Feed settings page to add an API key after following these instructions.