Read more about computer forensics
Bookmark and Share
  • USBKill turns thumb drives into computer kill switches

    05.05.2015

    A coder that goes by the online handle "Hephaestos" has shared with the world a Python script that, when put on an USB thumb drive, turns the device in an effective kill switch for the computer in which it's plugged in.

  • Python Forensics

    18.12.2014

    Author: Chet Hosmer Pages: 352 Publisher: Syngress ISBN: 0124186769 Introduction This book was touted as a "no-nonsense resource for the rapid development of new Python-based digital forensic applications." Given my deep love for Python and an interest in digital forensics, I had high hopes.

  • Mobile forensics in a connected world

    08.09.2014

    In this interview, Andrew Hoog, CEO of viaForensics, talks about the forensic examination of mobile devices, the challenges involved with testifying at trials, and offers advice to those interested in working in the mobile security forensics field.

  • Competition to crack a virtual terrorist HDD, break into CCTV systems

    01.08.2014

    Sophos is calling amateur security talent to turn sleuth and to investigate confiscated crime scene computer systems belonging to a cyber terrorist group as part of the latest Cyber Security Challenge.

  • Computer Incident Response and Forensics Team Management

    21.07.2014

    Author: Leighton Johnson Pages: 352 Publisher: Syngress ISBN: 159749996X Introduction In this day and age, it's only a matter of time when an organization's systems and networks will be breached by cyber attackers.




Spotlight

Researchers track Android users by collecting accelerator readings

A group of researchers have demonstrated that Android users' movements can be tracked by simply analyzing the data provided by the devices' accelerometers and orientation sensors.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  
DON'T
MISS

Wed, May 27th
    COPYRIGHT 1998-2015 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //