Video: The gems of electronic evidence

By

Jump lists, USB registry analysis, super timelines and wireless geolocation.

Digital forensics of the more interesting and valuable techniques used to find the gems of electronic evidence.

Video: The gems of electronic evidence

These techniques were applicable to criminal and corporate investigations and internal and external breaches. RSA Asia Pac

The 15 minute talk drew on SANS material to help security professionals with their forensic investigations by highlighting how jump lists, USB registry analysis, super timelines and wireless geolocation

Klein's slide deck is available online. (pdf

Darren Pauli travelled to Singapore as a guest of RSA.

Got a news tip for our journalists? Share it with us anonymously here.

Copyright © SC Magazine, Australia

Tags:

Most Read Articles

First npm worm "Shai-Hulud" released in supply chain attack

First npm worm "Shai-Hulud" released in supply chain attack

"VoidProxy" PhishKit targets Google and Microsoft users

"VoidProxy" PhishKit targets Google and Microsoft users

Apple adds "mercenary spyware" protection to new A19 chip

Apple adds "mercenary spyware" protection to new A19 chip

Phishing attack nets enormous npm supply chain compromise

Phishing attack nets enormous npm supply chain compromise

Log In

  |  Forgot your password?