December 23, 2014 8:13 am
Whether you run your own company or manage a team of people it’s important sometimes to stop and take some inspiration from those who have been through it all before and come out top.
December 16, 2014 9:56 am
This is the conclusion of our discusion with Jake Williams, Instructor at SANS Institute. We've discused North Korea's involvement, or lack of involvement, in the Sony breach, but who else might have been involved? And what is Sony doing to find out? Also, Jake lets us know from a digital-forensic perpective what could be done in situtations like this in the future.
December 15, 2014 10:29 am
The Sony breach has given a great deal of attention on North Korea. Whether the insular country was guilty of the attack or not, our continuing discusion with SANS Instructor, Jake Williams, touched on its capabilities.
December 15, 2014 5:04 am
Depending upon the nature of investigations, timely forensic examinations normally can expedite the apprehension of suspects. The use of a triage tool can identify the most likely evidentiary data sources. Ideally, the relevant evidence should then be seamlessly exported and analyzed in-depth by another comprehensive forensic tool which can provide indexing and detailed analysis.
December 12, 2014 11:55 am
At first glance, it would seem that the most logical and obvious way to increase storage capacity would be to add more platters to a hard drive. However, this raises a number of inherent problems, such as having to increase the size beyond the current form factors (3.5”, 2.5”, etc.), escalating the cost per hard drive, having to have more read/write heads per hard drive, and so forth.
December 12, 2014 10:30 am
In an attempt to understand what has happened during the breach of Sony Picture's computers, DFI News has contacted SANS Institute's DFIR team. In an email interview, Jake Williams, an Instructor at SANS, was generous enough to provide his insights into the complex digital forensic story unfolding at Sony.
December 10, 2014 10:24 am
Not long ago, mobile device forensics was a relatively straightforward process. Contact lists, SMS messages, and call logs were obtained and examined for evidence using specialized forensic technology. But with the blistering rate of advances in mobile technology, the explosion of mobile data and devices, times have drastically changed.
December 5, 2014 9:14 am
To increase hard drive storage capacity, manufacturers have been able to decrease the size of magnetic grains which comprise data bits. This allows for a greater number of bits of data to be recorded. However, the grains are so small that they can potentially interfere with each other. This diminishes their ability to maintain assigned magnetic orientations and data would become corrupted, leading to an unreliable and unusable hard drive.