Stephen Pearson presents paper on a refinement to the Exploitation SIDS framework
Stephen Pearson will be presenting the paper “Proposing a Change to the SIDSS Framework for Technical Exploitation Operations: Advancing the inclusion of Preparation & Triage to the SIDSS Framework” at the International Academy of Business Economics (http://www.iabe.org). The paper...
Read moreParaben adds MapLink Integration
Paraben Corporation, an innovator in the digital forensic market, along with HTCI, a developer of cutting-edge digital forensic training, is pleased to announce the integration of HTCI’s MapLink tool into Paraben’s E3 platform. Paraben and HTCI are committed to...
Read moreDJI Threatens Hacker
After computer researcher Kevin Finisterre exposed details of his intrusion into the servers of the world’s leading consumer drone maker, gaining access to sensitive customer information, DJI pushed back. Ars Technica breaks down the details. Read more >
Read moreThe Supreme Court could soon change the course of how location data is used
The courts of the 21st century are being tasked with 21st-century issues, namely those related to smartphones and their data. From data stored on iPhones to location data associated with other mobile devices, these tiny pieces of technology are presenting big...
Read moreSmall Words in an Email Can Reveal a Person’s Identity
It’s possible to identify the author of an email by analysing as little as two words, research by Nottingham Trent University suggests. Dr. David Wright, an expert in forensic linguistics, examined thousands of emails to show it’s possible to...
Read moreWhite House High on Drones, FAA Gets Tech to Help Manage Them
A memo signed by President Donald Trump on Oct. 25 calls for an UAS Integration Pilot Program to be stood up within the next 90 days. Under the program, the Federal Aviation Administration will work with state, local and...
Read moreThe Challenge of Authenticating Real Humans in a Digital World
This increasing dependence on digital authentication may actually result in less security. While cameras, sensors and other devices can make authentication easier for people to accomplish, they carry their own weaknesses. It may be more convenient, and even more secure,...
Read moreBiometrics to Replace PIN Code in Nigeria
The Central Bank of Nigeria (CBN) has disclosed that with the Bank Verification Number (BVN) in place, biometrics will soon be used for transactions on the Automated Teller Machine (ATM) instead of the existing pin code. The 2017 verification...
Read moreHomeland Security bulletin warns of weaponized drones and threat to aviation
The Department of Homeland Security (DHS) issued an updated terror bulletin on Thursday highlighting the threat of weaponized drones, chemical attacks and the continued targeting of commercial aircraft. “We continue to face one of the most challenging threat environments...
Read more