How can you trust a forensic scientist to have maintained the chain of custody?

I have been reading about the chain of custody in cybersecurity-related forensics and I wonder how you can be so sure the forensic scientist made their job right and they are not a malicious actor.
I have a specific scenario in mind, let’s… Continue reading How can you trust a forensic scientist to have maintained the chain of custody?

Police Use DNA Phenotyping to Limit Pool of Suspects to 15,000

The Queensland police department said that the DNA sample from the case generated a genealogy tree of “15,000 ‘linked’ individuals” and they have not been able to find a close match yet.  Continue reading Police Use DNA Phenotyping to Limit Pool of Suspects to 15,000

Minor being reported to the police as a child predator for sexting another minor. What will happen to me? Please help [closed]

I’m a minor and I started chatting online with other minors sexually (mostly older than myself) on an “anonymous” account. This took place on twitter and discord. The minor that I was texting with then reported me to an online vigilante gr… Continue reading Minor being reported to the police as a child predator for sexting another minor. What will happen to me? Please help [closed]

When you go fighting malware don´t forget your VT plugins

It’s been a year since we launched our VirusTotal plugin for IDA Pro, followed by SentinelOne’s amazing contribution to the community with their VirusTotal plugin for GHIDRA (thanks again for the great job), inspired by the original IDA plugin but addi… Continue reading When you go fighting malware don´t forget your VT plugins