Forensics

IT Strike Force: Establishing a Cyber Forensic Response Strategy

"Mathias Thurman,” a real security manager, whose name and employer has been disguised for obvious reasons, wrote in the May 21st (2012) edition of Computerworld that an administrator, during a training session with an employee, on how to manage the organization’s antivirus infrastructure, while reviewing the reports of machines with infected files, spotted what appeared to be a very suspicious .mov file.