Tags » Computer Forensics

Techno Security 2018 Round-Up

This article is a recap of some of the main highlights from the Techno Security & Forensic Investigation Conference 2018, which took place in Myrtle Beach, SC from the 3rd-6th June 2018. 212 more words

Digital Forensics

Preserving MAC Times Collecting Files in E-Discovery

Checking the mailbag, I received a great question from a recent Georgetown E-Discovery Training Academy attendee.  I’m posting it here in hopes my response may be useful to you. 736 more words

E-Discovery

Deep Learning At The Shallow End: Malware Classification For Non-Domain Experts

by Quan Le, Oisín Boydell, Brian Mac Namee & Mark Scanlon

Abstract

Current malware detection and classification approaches generally rely on time consuming and knowledge intensive processes to extract patterns ( 7,351 more words

Digital Forensics

New Grant Thornton Thought Leadership - Mandatory Initial Discovery Protocol

I’m proud to have contributed (with my Grant Thornton LLP colleagues Lucas Newcomer and David Aberman) to an overview of the the #MIDP eDiscovery protocols being piloted by the Judicial Conference of the United States…

https://sb.gl/2rDs93T

EDiscovery

[Products Launch] Boost Your Imaging Speed With SalvationDATA New Generation Forensic Hardware: DCK 2 and Write-Blocker

Editor’s note: For more than 18 years, SalvationDATA has always been dedicated to his efforts in bringing perfect digital forensic solutions to the DFIR community. And today, we are thrilled to share this new release of our new generation forensic hardware with all our valuable customers! 254 more words

NEWS & EVENTS

[News] SalvationDATA awarded "Sichuan Province Academician Expert Work Station"

Editor’s note: On May 30, 2018, SalvationDATA received an award from the Sichuan Provincial Academician Expert Work Station and our founder Kenneth Liang attended the Sichuan Province Science and Technology Award Conference. 141 more words

NEWS & EVENTS

[Case Study] Computer Forensics: How To Forensically Extract Evidence Data From A Virtual Machine

Editor’s notes: Virtual machine (VM) is a quite popular technology in recent years. Every single VM simulates the performance of all crucial components and runs like a real computer system. 940 more words

COMPUTER FORENSICS