Computer forensics is a slow process. Examiners typically embark on a tedious file review process to determine each file’s relevance to a particular case. This can quickly add hours and extra costs to ...
In previous articles, I’ve discussed log management and incident response in the age of compliance. It’s time to cover a separate topic that has connections to both log analysis and incident ...
I recently had the opportunity to perform some basic computer forensic analysis for clients who wanted to know if their computers had been used for "illicit" purposes. One client, the owner of a ...
In today's digital age, criminal and civil investigations increasingly rely on technical evidence. Computer forensic expert witnesses play a crucial role in analyzing data from electronic devices, ...
Every now and then, forensic experts or just curious novices will have to investigate technologies using tools that are not always readily available. For that reason, this post explores simple ways ...
While at FOSE last week, I attended a very good session called SANS Forensic and Incident Response. The session was led by Rob Lee from Mandiant who moonlights as a computer forensics trainer. Rob ...
Australian university students have developed a Linux-based data forensics tool to help police churn through a growing backlog of computer-related criminal investigations. The tool was developed by ...
In too many cases, computer forensics firms are called in midway through litigations only to find that key evidence is beyond their grasp, unattainable because of discovery deals that had been struck ...