Menu

Blogs

Showing Blog Posts: 11–20 of 28 tagged Forensics

  • The Hacker's Guide to OS X: Exploiting OS X from the Root Up

    by Ben Rothke on March 5, 2013

    The Macintosh operating system was long considered more secure than Windows. Part of the reason was that the vast majority of attackers targeted Windows given it was so ubiquitous. A lot has changed and the Macintosh operating system, currently known as OS X is both a target and highly vulnerable. In The Hacker's Guide to OS X: Exploiting OS X from the Root Up, authors Robert Bathurst, Russ Rogers…

  • Malware Forensics Field Guide for Windows Systems: Digital Forensics Field Guides

    by Ben Rothke on October 5, 2012

    Wikipedia defines a field guide as a book designed to help the reader identify wildlife (plants or animals) or other objects of natural occurrence (e.g. minerals). It is generally designed to be brought into the 'field' or local area where such objects exist to help distinguish between similar objects. If you change wildlife to Malware Forensics, then you have the Malware Forensics Field Guide for…

  • Digital Forensics for Handheld Devices

    by Ben Rothke on September 24, 2012

    Today’s handheld device is the mainframe of years past. An iPhone 5 with 64 GB of storage and the Apple A6 system-on-a-chip processor has more raw computing power entire data centers had some years ago. With billions of handheld devices in use worldwide, it is imperative that digital forensics investigators and others know how to ensure that the information contained in them, can be legally…

  • Preview - Digital Forensics for Handheld Devices

    by Ben Rothke on August 30, 2012

    Today’s handheld device is the mainframe of years past. The raw computing power and stored memory found in a BlackBerry, iPhone, digital camera or GPS dwarfs that of computers from years ago. With billions of such devices in use, it is imperative systems administrator, forensics investigators and others know how to ensure that the information contained in them, can be legally preserved if needed. …

  • Illustrated Guide to Home Forensic Science Experiments: All Lab, No Lecture

    by Ben Rothke on August 22, 2012

    While the Illustrated Guide to Home Forensic Science Experiments: All Lab, No Lecture is not a pure play information security book, it’s likely that anyone interested in information security will find this a fascinating read. The book is written for anyone, from responsible teenagers to adults who want to learn about forensic science by doing real, hands-on laboratory work. While the tools for…

  • Smart Cars and eDiscovery

    by Stephen Wu on August 16, 2012

    I heard an interesting radio show on NPR the other day. Auto manufacturers are rolling out the next generation of cars that try to implement the lessons the phone manufacturers learned from Apple, Google, and others. Let's put screens on cars, and give them apps, they say. Let's do for the car what iOS and Android did for phones and tablets. Cars dashboards should have apps, just like any other…

  • Ally's Picks - Garage Sale Forensics

    by Ally Lorentson Dunn on August 14, 2012

    One of the most interesting sessions I attended at the conference this year was Mike Wright's presentation on the proper way to destroy your devices. In this session Mike outlines how he was able to obtain dozens of data storage devices from garage sales and thrift stores and upon looking at what was left on them, found a shocking amount of information. His favorite methods for properly disposing…

  • Network Forensics: Tracking Hackers through Cyberspace

    by Ben Rothke on June 28, 2012

    With a title like Network Forensics: Tracking Hackers through Cyberspace, the book at first sounds like a cheesy novel. But by page 25, you will quickly see this is the real thing. By the time you hit the last page, you will have read the collective wisdom of two of the smartest minds in the space. Author’s Jonathan Ham and Sherri Davidoff are both SANS Institute instructors, and bring significant…

  • First Criminal Case in BP Oil Spill Based on Spoliation

    by Stephen Wu on April 25, 2012

    Yesterday, the first criminal charges in the BP oil spill disaster were unveiled, as the government arrested and charged BP engineer Kurt Mix with obstruction of justice. What was the crime charged? The government charged Mix with obstruction of justice based on Mix allegedly deleting text messages from his iPhone. In other words, the first criminal case in the BP disaster had to do with…

  • The Legal Profession – Still Catching Up with the New Reality

    by Stephen Wu on December 8, 2011

    eDiscovery rules, the law of spoliation, and evidence law now address electronically stored information (ESI). Courts and some commentators are now talking about the effect of the Internet, social networking, and cloud computing on eDiscovery and evidence law. Thus, the law is starting to catch up with the new reality of computers and the Internet. But is the legal profession catching up with this…

This document was retrieved from http://www.rsaconference.com/blogs on Mon, 22 Dec 2014 00:36:23 -0500.
© 2014 EMC Corporation. All rights reserved.