December 16, 2014 9:56 am
This is the conclusion of our discusion with Jake Williams, Instructor at SANS Institute. We've discused North Korea's involvement, or lack of involvement, in the Sony breach, but who else might have been involved? And what is Sony doing to find out? Also, Jake lets us know from a digital-forensic perpective what could be done in situtations like this in the future.
December 15, 2014 10:29 am
The Sony breach has given a great deal of attention on North Korea. Whether the insular country was guilty of the attack or not, our continuing discusion with SANS Instructor, Jake Williams, touched on its capabilities.
December 15, 2014 5:04 am
Depending upon the nature of investigations, timely forensic examinations normally can expedite the apprehension of suspects. The use of a triage tool can identify the most likely evidentiary data sources. Ideally, the relevant evidence should then be seamlessly exported and analyzed in-depth by another comprehensive forensic tool which can provide indexing and detailed analysis.
December 12, 2014 11:55 am
At first glance, it would seem that the most logical and obvious way to increase storage capacity would be to add more platters to a hard drive. However, this raises a number of inherent problems, such as having to increase the size beyond the current form factors (3.5”, 2.5”, etc.), escalating the cost per hard drive, having to have more read/write heads per hard drive, and so forth.
December 12, 2014 10:30 am
In an attempt to understand what has happened during the breach of Sony Picture's computers, DFI News has contacted SANS Institute's DFIR team. In an email interview, Jake Williams, an Instructor at SANS, was generous enough to provide his insights into the complex digital forensic story unfolding at Sony.
December 10, 2014 10:24 am
Not long ago, mobile device forensics was a relatively straightforward process. Contact lists, SMS messages, and call logs were obtained and examined for evidence using specialized forensic technology. But with the blistering rate of advances in mobile technology, the explosion of mobile data and devices, times have drastically changed.
December 5, 2014 9:14 am
To increase hard drive storage capacity, manufacturers have been able to decrease the size of magnetic grains which comprise data bits. This allows for a greater number of bits of data to be recorded. However, the grains are so small that they can potentially interfere with each other. This diminishes their ability to maintain assigned magnetic orientations and data would become corrupted, leading to an unreliable and unusable hard drive.
November 26, 2014 8:13 am
Effective training in professional ethics doesn’t primarily consist of rote memorization of rules, but instead must prepare the examiner in the art of ethical issue spotting. Similarly, an effective code of ethics consists not only of certain static core principles, but also may consist of components that can be adapted over time to keep pace with the law and with professional norms.
November 25, 2014 7:00 am
The mobile device industry is evolving very quickly. To stay current on the latest devices and the proper techniques for acquiring and analyzing data, smartphone and mobile device forensic analysis training courses are becoming more and more necessary.
November 21, 2014 4:58 pm
A month after rebranding from Telecom to Spark, the leading New Zealand ISP had received collateral damage from the conflict between Russia and Ukraine. Fights there have never really been toe-to-toe, but, on Friday evening, September 5, Spark engineers announced that a layer-3 DDoS attack was causing an overload of its DNS servers.
- 1 of 2
- next ›