|eForensics OPEN 2016 Compilation.pdf|
We would like to present to you the first “Open” issue of 2017! We decided to compile for you some articles we published in 2016 and make them available to everyone. So, without further ado, here it is!
In this issue you’ll learn, among other things, about digital forensic backlogs and the use of automation in digital investigations, how to perform logical and physical extraction from Android devices with Magnet Acquire, and how to do practical live analysis and auditing using Redline IOC models. You will also have a chance to read about trends and predictions for skills in cybersecurity and about lessons you can learn from incident response.
You’ll find two interviews inside as well, one with Magnet Forensics’ CEO Adam Belsher, and the second with Monnappa KA, our long time author.
We hope you’ll enjoy, do let us know how you like it!
at eForensics Magazine
Cybersecurity Skill Predictions: Trends for 2017
by Ricki Burke
2016 has been an interesting year in the Information Security world. I feel like it was the year hacking became normalized. We have seen a variety of attacks and victims range from a single person suffering from ransomware, to the DDos attacks that took down a chunk of the Internet for most of the Eastern seaboard, to the U.S. election where the Senate Republican leader is now backing an investigation into whether Russian hackers influenced the results.
Unearthing the web: the good, the bad, and the ugly
by Christian Berg, NetClean
Technical advances have unreservedly transformed our lives. Technology has changed the way we communicate, travel, learn and even find love. The internet alone has given rise to a worldwide community and a forum for the mass exchange of information. It’s a place people can turn to for inspiration, idea sharing and keeping in contact with friends, regardless of their location. In turn, we perceive it as a force for good, offering overwhelming opportunity for collaboration and education.
Ten Lessons For Incident Response
The author of the article requested to remain anonymous.
It started with an email. There was an odd amount of traffic from our Primary Data Center to the IP of some non-descript website. I had a Blackberry at the time and felt safe checking out the site to see if it was obviously malicious. It was a Sunday, I was in the car with the family and the website didn’t seem threatening at first blush. I replied that this could wait until Monday morning to dive deeper and find out what was wrong.
Siri is a Big Snitch: Creative Techniques to Glean Information from an iPhone
by Kevin DeLong, Access Data
One of the great challenges law enforcement agencies face worldwide is that cybercriminals are finding new ways to go undetected. Many of them slip into private online groups and use mobile apps to target children, women, the elderly and vulnerable people of all ages. Then by the time investigators catch on to one of their methods, another one has been implemented.
Trying our best to bridge the gaps
Interview with Monnappa K A, the co-founder of Cysinfo
There is great need, and there is great opportunity
Interview with Adam Belsher, CEO of Magnet Forensics
Digital Forensic Backlogs and the use of Automation in Digital Investigations
by Ryan Duquette
Leaps in technology over the last 20 years have created some true benefits to society; real-time collaboration, cheap and reliable digital storage, the ability to perform complex processing in a matter of seconds – all things designed to simplify and speed up our lives. Generally speaking, as technology has evolved, it’s allowed us to complete tasks more efficiently, and more cost effectively. While this benefits most individuals and businesses, one area where this evolution is having an adverse effect is in the digital forensic space, especially within the realm of law enforcement.
Performing Logical And Physical Extraction From Android Devices With Magnet Acquire
by Oleg Skulkin
For quite a long time, there have not been any free tools for imaging smartphones and tablets. Thanks to Magnet Forensics, now any digital forensic examiner or analyst is able to extract data from Android and iOS devices quickly and easily with their new acquisition tool – Magnet ACQUIRE, that is available at no cost.
Practical Live Analysis and Auditing Using Redline IOC Models (Part I)
by Paulo Henrique Pereira, PHD.
What is our challenge in a real case? Our discussion on Redline usage will be divided into two parts. In the first part, presented in this article, we will cover a basic introduction to Redline. In the second part, which will be published in a later issue, we will deal with the IOC Models call methodology.
Is Building a Partnership between Information Security and the Business Possible?
by Paige Ishii
I often think company information security departments get a bad rap. Here’s why. When was the last time you heard your Security Department or your CSO say to the business: “Sure, no problem, we can do that! Go ahead and do (fill in your potential leak of data here) and we will think about the ramifications and potential breaches in security and regulatory requirements later!”
|eForensics OPEN 2016 Compilation.pdf|