Digital Forensics

Important Cybercrime Laws

There are a number of cybercrime laws that are extremely important in the field of digital forensics and cybersecurity as a whole. Two of...
Ian Carnaghan
1 min read

Yet More Theft of Information Assets

It doesn’t seem that long ago that I received an official letter in the mail from the United States Office of Personnel Management (OPM)...
Ian Carnaghan
1 min read

Preparation Phase of a Digital Search

The preparation phase of digital search is the most important phase of the digital investigation process. If not carried out correctly, the can lead...
Ian Carnaghan
1 min read

Data Hiding and Steganography

The term ‘Steganography’ refers to ‘covered writing’ and encompasses methods of transmitting secret messages through innocuous cover carriers in a manner that their existence...
Ian Carnaghan
1 min read

Confusion over Terminology

The terms risk, vulnerability and threat are often confusing and sometime interchangeable leading to a lack of understanding when presenting evidence. Risks are usually...
Ian Carnaghan
54 sec read

Presenting Digital Evidence

Testifying and writing a report are both essential ingredients to a successful digital forensics investigation. Digital forensics personnel will potentially spend months of time...
Ian Carnaghan
1 min read

Remote Access Trojans

Remote Access Trojans have become a serious security concern as hackers have developed more sophisticated code that can be installed and hidden on a...
Ian Carnaghan
1 min read

Malicious Code Detection

Malicious code detection is an ongoing obfuscation-deobfuscation game because of the nature of the malware or goals of the attacker. Detection of malicious executables...
Ian Carnaghan
1 min read

What is the Role of Computer Forensics?

Computer forensics can play a vital role in an organization’s recovery from a cyber attack. By properly following forensics processes carefully in the aftermath...
Ian Carnaghan
48 sec read