securityis.com
InfoSec Blogs - Security Is . . .
http://www.securityis.com/5.html
Security Is . . . Computer Forensics/E-Discovery Tips/Tricks and Information. Digital Soapbox - Preaching Security to the Digital Masses. Episteme: Belief, Knowledge, Wisdom. SANS Computer Forensics Blog. SANS Institute Reading Room.
forensicblog.org
Posts tagged: humor | Forensic Computing
http://www.forensicblog.org/tag/humor
Digital forensics from the view of a computer scientist. You are here: Home. If Apple did computer forensics…. April 6, 2010. This is too funny…. You can find the full post here. If Apple did computer forensics…. Outlook PST (Personal Folder) File Format Now Available From Microsoft. Microsoft to Release the .PST File Format. Computer Forensic Exam of Najibullah Zazi’s Laptop. Return to top of page.
forensicir.blogspot.com
Forensic Incident Response: On the sophistication of attacks
http://forensicir.blogspot.com/2011/04/on-sophistication-of-attacks.html
This blog was created to support some of the work I'm doing and to contribute to the forensic community. I'll be blogging about the science of forensics, incident response, methodologies, relating real world investigations to digital ones and some other tidbits. Thursday, April 14, 2011. On the sophistication of attacks. If they appear unsophisticated, you will believe that they are not capable of more. If you believe that is all they are capable of, you will assume they are not dangerous. April 24, 2011...
davidkoepi.wordpress.com
Mac Forensics Part 2 (Acquisition) | David Koepi
https://davidkoepi.wordpress.com/2013/07/06/macforensics2
Taking one byte at a time. Mac Forensics Part 1. Mac Forensic Part 3 (Filesystem) ». Mac Forensics Part 2 (Acquisition). July 6, 2013. Remove harddisk and image harddisk using forensic equipments/software. Advantage: This is generally accepted method for all systems. Imaging using this method can be applied using all common forensic equipments/software. Forensic Linux Boot CD. Advantage: Many options are available (eg Sumuri’s Paladin. Typically, Read-only are enable on boot for all storage media. Advant...
forensics-research.com
Computer Forensics
http://www.forensics-research.com/index.php/computer-forensics
Mobile Device Tempest Virus. This section is suppose to give condense information about discipline of computer forensic. You can read it as an introduction and first step to understand this interesting area of high tech crimes. It’s simple evolution of crime techniques and ideas. Forensic science has a ma…. Computer Forensic Timelin…. Forensic science has a many of subdivisions:. Forensic accounting – study and interpretation of accounting evidence. Forensic anthropology – application of physical a...
forensics-research.com
Mobile Device Tempest Virus
http://www.forensics-research.com/index.php/projects/windows-mobile-tempest-virus
Mobile Device Tempest Virus. Mobile Device Tempest Virus. Mobile Device Tempest Virus. INFORMATION LEAKAGE FROM MOBILE DEVICES USING COMPROMISING ELECTROMAGNETIC EMANATIONS. Project aim was to create proof of concept mobile device application (mobile phone, PDA), which enable leakage of valuable information (e.g. passwords, contact list, sim information). As a data transmission channel I am using electromagnetic emanation of device TFT LCD screen. Project have confirmed that signal strength is not connec...
forensics-research.com
Anti-Forensics Overview
http://www.forensics-research.com/index.php/2012/01/anti-forensics-overview
Mobile Device Tempest Virus. Digital Forensics Challenge 2012. On January 27, 2012, in Antiforensic posts. Liu and Brown identify four primary goals for anti-forensics:. Avoiding detection that compromising event has taken place. Encryption – one of antiforensics methods. Disrupting and preventing from collection of information. Increasing the time that an examiner needs to spend on a case. Casting doubt on a forensic report or testimony (Liu and Brown, 2006). Other goals might include:. In short Data Co...
SOCIAL ENGAGEMENT