We often see more mobile devices come into our forensic lab than traditional computers (desktops and laptops). One reason for that is because mobile devices are consistently becoming more like ...
The Cybersecurity and Infrastructure Security Agency (CISA), in partnership with Sandia National Laboratories, has announced the release of Thorium, an automated, scalable malware and forensic ...
In September 2009, the Department of Homeland Security announced 1000 new job openings for computer security experts and, overall, the number of jobs requiring security skills is dramatically ...
The Department of Homeland Security Science and Technology Directorate has licensed a malware forensics detection and software assurance package, the second technology to emerge from the Cyber ...
Computer forensics gave Michael Fiola his life back. Fiola is the former investigator with the Massachusetts Department of Industrial Accidents who found himself summarily dismissed after an IT check ...
The surveillance-for-hire industry's powerful mobile spyware tools have gotten increasing attention lately as tech companies and governments grapple with the scale of the threat. But spyware that ...
The days of performing only traditional “dead” forensics on a host after a security incident are over. A shift to “live” forensics and incident response investigations is underway, with a round of new ...
The latest trends and issues around the use of open source software in the enterprise. Traceeshark enhances the capabilities of Aqua Tracee, an open source runtime security and forensics tool for ...
Malware that runs inside GPUs (graphics processing units) can be harder to detect, but is not completely invisible to security products. Researchers from Intel division McAfee Labs teamed up with ...