Video: The gems of electronic evidence

By

Jump lists, USB registry analysis, super timelines and wireless geolocation.

Digital forensics of the more interesting and valuable techniques used to find the gems of electronic evidence.

Video: The gems of electronic evidence

These techniques were applicable to criminal and corporate investigations and internal and external breaches. RSA Asia Pac

The 15 minute talk drew on SANS material to help security professionals with their forensic investigations by highlighting how jump lists, USB registry analysis, super timelines and wireless geolocation

Klein's slide deck is available online. (pdf

Darren Pauli travelled to Singapore as a guest of RSA.

Got a news tip for our journalists? Share it with us anonymously here.

Copyright © SC Magazine, Australia

Tags:

Most Read Articles

Travel eSIMs secretly route traffic over Chinese and undisclosed networks: study

Travel eSIMs secretly route traffic over Chinese and undisclosed networks: study

Attackers weaponise Linux file names as malware vectors

Attackers weaponise Linux file names as malware vectors

Home Affairs adds SecOps to new cyber risk overhaul

Home Affairs adds SecOps to new cyber risk overhaul

Microsoft plans full quantum-resistant cryptography transition by 2033

Microsoft plans full quantum-resistant cryptography transition by 2033

Log In

  |  Forgot your password?