Advertisement
Videos
Subscribe to DFI News

The Lead

Stealing Money from ATMs with Malware

January 7, 2014 | by Help Net Security | Comments

This talk from the 30th Chaos Communication Congress will discuss a case in which criminals compromised and robbed an ATM by infecting it with specially crafted malware. The successful compromise of an ATM can easily result in the loss of several hundred thousand dollars.

TOPICS:
View Sample

SUBSCRIBE TO FREE
DFI News
EMAIL NEWSLETTER

Ditto Forensic FieldStation Overview

February 10, 2014 10:01 am | by James Wiebe | Comments

The CRU Ditto Forensic FieldStation combines special-purpose computing hardware, capable of fast analysis, and carefully selected duplication of attached hard drive data. It has all of the classic characteristics required for forensic investigations and IT personnel.

TOPICS:

Unboxing Digital Forensics Equipment with Google Glass

September 10, 2013 12:08 pm | by UNH Cyber Forensics | Comments

University of New Haven Cyber Forensics decided to unbox some expensive digital forensics equipment and record it with Google Glass and a Geo Pro. Everyone has watched unboxing videos - but we have never seen someone unbox digital forensics equipment! Enjoy the write-blockers, forensic duplicators/wipers and the beast F.R.E.D.

Acceptability of Digital Evidence

February 5, 2013 6:58 am | Comments

Gary Kessler explores the acceptability of digital evidence in court as regards the Federal Rules of Evidence.

TOPICS:
Advertisement

Futures Exploration at the CDFAE

February 5, 2013 6:21 am | Comments

  A look at the Department of Defense Cyber Crime Center's Digital Forensics Academic Excellence Program.  

TOPICS:

NIST Colloquium Series: Digital Forensics

July 23, 2012 1:06 pm | Comments

Dr. Hany Farid, a distinguished professor at Dartmouth College and the "father" of digital image forensics, is an expert on authenticating images.

A Geek's Guide to Digital Forensics

January 20, 2012 9:18 am | Comments

A technical introduction to digital forensics geared towards fellow geeks who think tinkering with data in hex is fun and interesting.

Advanced Post Exploitation with Rootkits

July 6, 2011 8:04 am | Comments

This is a post-exploitation demonstration with a walk-through of exploiting a Windows machine, getting a copy of the Web server's home page, and then modifying it with an iframe that points to an exploit server.

Encase: Locating the MFT from the Volume Boot

November 17, 2010 10:13 am | Comments

Here's how to locate the MFT and MFT Mirror from the Volume Boot, using EnCase.

Advertisement

3 Weeks Left in the 2010 DC3 Digital Forensics Challenge

October 5, 2010 11:55 am | Comments

As we start the month of October, we grow closer to the November 2nd, 2010 Challenge submission deadline. The 2010 DC3 Challenge already has over 30 teams with partial and full submissions. With over 11 prizes available this year, make sure to get your submissions in.

UAB Fights Cybercrime Nationwide

September 22, 2010 8:59 am | Comments

Operation Swordphish partners the University of Alabama at Birmingham cybercrime laboratory with the Alabama Department of Public Safety and Alabama District Attorneys Association with the goal of prosecuting state and local cybercrimes.

Copy Machines, a Security Risk?

September 22, 2010 8:51 am | Comments

Armen Keteyian reports on the vast amount of data on photocopier hard drives which store images of every document scanned, copied, or emailed by the machine.

Computational and Mathematical Techniques for Authenticating Digital Media

September 1, 2010 10:49 am | Comments

In this NIST Colloquium Series presentation, Dr. Hany Farid discusses the impact that camera manipulation and alteration have caused, focusing on digital tampering and manipulation, techniques for authenticating digital media, and mathematical and computational forensic techniques.

What Happens When You Delete a File?

August 25, 2010 7:30 am | Comments

Computer Forensics Expert Steve Burgess explains what's left over when a file is deleted, and what happens when it is created.

Recovering Deleted E-mail

August 11, 2010 11:42 am | Comments

Computer Forensics Expert Steve Burgess explains what can and cannot be recovered from different kinds of e-mail programs such as Outlook, Eudora, and Webmail.

Computer Forensics: Tracing an E-mail (Hotmail)

August 3, 2010 11:32 am | Comments

A video guide on how to trace the geographic origin of a Hotmail e-mail.

Pages

X
You may login with either your assigned username or your e-mail address.
The password field is case sensitive.
Loading