Menu

Blogs

Showing Blog Posts: 11–20 of 31 tagged Forensics

  • Locked Down: Information Security for Lawyers

    by Ben Rothke on May 20, 2013

    Had Locked Down: Information Security for Lawyers not been published by the American Bar Association (ABA) and 2 of its 3 authors not been attorneys; one would have thought the book is a reproach against attorneys for their obliviousness towards information security and privacy. In numerous places, the book notes that lawyers are often clueless when it comes to digital security. With that, the…

  • Cybersecurity: Public Sector Threats and Responses

    by Ben Rothke on May 2, 2013

    One of the myriad benefits of the Internet has been the increase in efficiency and speed of communications. What used to take days and weeks to transmit can now be sent instantly with Facebook, e-mail, Twitter, and the like. In Cybersecurity: Public Sector Threats and Responses, author Kim Andreasson provides an over­view of how government agencies and other public-sector groups can use the…

  • Applied Information Security: A Hands-on Approach

    by Ben Rothke on April 22, 2013

    In Applied Information Security: A Hands-on Approach, authors David Basin, Patrick Schaller and Michael Schläpfer detail some of the labs exercises and texts that they used for courses they gave at ETH Zürich (Eidgenössische Technische Hochschule Zürich), an engineering and science -based university in Zurich, Switzerland. In fewer than 200 pages, the book is an intense introduction to the…

  • The Hacker's Guide to OS X: Exploiting OS X from the Root Up

    by Ben Rothke on March 5, 2013

    The Macintosh operating system was long considered more secure than Windows. Part of the reason was that the vast majority of attackers targeted Windows given it was so ubiquitous. A lot has changed and the Macintosh operating system, currently known as OS X is both a target and highly vulnerable. In The Hacker's Guide to OS X: Exploiting OS X from the Root Up, authors Robert Bathurst, Russ Rogers…

  • Malware Forensics Field Guide for Windows Systems: Digital Forensics Field Guides

    by Ben Rothke on October 5, 2012

    Wikipedia defines a field guide as a book designed to help the reader identify wildlife (plants or animals) or other objects of natural occurrence (e.g. minerals). It is generally designed to be brought into the 'field' or local area where such objects exist to help distinguish between similar objects. If you change wildlife to Malware Forensics, then you have the Malware Forensics Field Guide for…

  • Digital Forensics for Handheld Devices

    by Ben Rothke on September 24, 2012

    Today’s handheld device is the mainframe of years past. An iPhone 5 with 64 GB of storage and the Apple A6 system-on-a-chip processor has more raw computing power entire data centers had some years ago. With billions of handheld devices in use worldwide, it is imperative that digital forensics investigators and others know how to ensure that the information contained in them, can be legally…

  • Preview - Digital Forensics for Handheld Devices

    by Ben Rothke on August 30, 2012

    Today’s handheld device is the mainframe of years past. The raw computing power and stored memory found in a BlackBerry, iPhone, digital camera or GPS dwarfs that of computers from years ago. With billions of such devices in use, it is imperative systems administrator, forensics investigators and others know how to ensure that the information contained in them, can be legally preserved if needed. …

  • Illustrated Guide to Home Forensic Science Experiments: All Lab, No Lecture

    by Ben Rothke on August 22, 2012

    While the Illustrated Guide to Home Forensic Science Experiments: All Lab, No Lecture is not a pure play information security book, it’s likely that anyone interested in information security will find this a fascinating read. The book is written for anyone, from responsible teenagers to adults who want to learn about forensic science by doing real, hands-on laboratory work. While the tools for…

  • Smart Cars and eDiscovery

    by Stephen Wu on August 16, 2012

    I heard an interesting radio show on NPR the other day. Auto manufacturers are rolling out the next generation of cars that try to implement the lessons the phone manufacturers learned from Apple, Google, and others. Let's put screens on cars, and give them apps, they say. Let's do for the car what iOS and Android did for phones and tablets. Cars dashboards should have apps, just like any other…

  • Ally's Picks - Garage Sale Forensics

    by Ally Lorentson Dunn on August 14, 2012

    One of the most interesting sessions I attended at the conference this year was Mike Wright's presentation on the proper way to destroy your devices. In this session Mike outlines how he was able to obtain dozens of data storage devices from garage sales and thrift stores and upon looking at what was left on them, found a shocking amount of information. His favorite methods for properly disposing…

This document was retrieved from http://www.rsaconference.com/blogs on Fri, 31 Jul 2015 17:26:30 -0400.
© 2015 EMC Corporation. All rights reserved.