There’s nothing quite like stirring the pot of controversy. Last month, my Cache Advance column addressed the issue of cheating on certification exams. Specifically, I said that using “study aids” ...
Database hacking has gone mainstream and is becoming harder to detect because of the increasingly sophisticated anti-forensic procedures hackers use to cover their tracks. Knowing forensics inside and ...
A database security researcher will demonstrate at next month's Black Hat DC how an attacker who breaks into a SQL Server database can cover his tracks using antiforensics techniques. Cesar Cerrudo, ...
Regardless of these challenges, forensics and intrusion management technologies are in high demand. This need is driven especially by the fact that confidential data stored on systems are potential ...
AUSTIN, Texas—Huge volumes — think terabytes, petabytes, exabytes, zettabytes, yottabytes and up into the quintillion bytes — of complex, digital data is constantly being generated and scattered into ...
White-collar crime and workplace fiascos is putting data forensics on the front lines of crime scenes. We take a look into how one IT specialist dig deep to find the buried treasure on suspicious hard ...
Atlantic Data Forensics (ADF) Friday was awarded Cyber Defender of the Year in the 2020 MD Cybersecurity Awards by the Cybersecurity Association of Maryland Inc. (CAMI), Maryland’s only nonprofit ...
David Litchfield presented "Hacking and Forensicating an Oracle Database Server" at the Black Hat 2011 conference. During the presentation, Litchfield discussed a handful of ways to hack into Oracle ...
Australian university students have developed a Linux-based data forensics tool to help police churn through a growing backlog of computer-related criminal investigations. The tool was developed by ...