There’s nothing quite like stirring the pot of controversy. Last month, my Cache Advance column addressed the issue of cheating on certification exams. Specifically, I said that using “study aids” ...
A database security researcher will demonstrate at next month's Black Hat DC how an attacker who breaks into a SQL Server database can cover his tracks using antiforensics techniques. Cesar Cerrudo, ...
AUSTIN, Texas—Huge volumes — think terabytes, petabytes, exabytes, zettabytes, yottabytes and up into the quintillion bytes — of complex, digital data is constantly being generated and scattered into ...
Atlantic Data Forensics (ADF) Friday was awarded Cyber Defender of the Year in the 2020 MD Cybersecurity Awards by the Cybersecurity Association of Maryland Inc. (CAMI), Maryland’s only nonprofit ...
The partnership expands mobile, cloud, and enterprise data acquisition capabilities by aligning Page One’s forensic ...
David Litchfield presented "Hacking and Forensicating an Oracle Database Server" at the Black Hat 2011 conference. During the presentation, Litchfield discussed a handful of ways to hack into Oracle ...
White-collar crime and workplace fiascos is putting data forensics on the front lines of crime scenes. We take a look into how one IT specialist dig deep to find the buried treasure on suspicious hard ...
Storming a building and seizing computers for evidence was the easy part for the Fairfield Police Department, which serves a city of about 100,000 people in central California. But capturing and ...
To make it easier for forensic investigators to find relevant data on computers, cellphones and other electronic equipment seized in police raids, the National Institute of Standards and Technology ...
Australian university students have developed a Linux-based data forensics tool to help police churn through a growing backlog of computer-related criminal investigations. The tool was developed by ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results