* Review of forensics firm CyberEvidence’s CyberBits newsletter I recently began receiving an interesting monthly newsletter on digital forensics called _CyberBits_, which comes from CyberEvidence, a Texas firm that specializes in computer forensics training and computer incident response.The company works with law enforcement and private companies in collecting and analyzing digital forensic evidence. The founder, Paul Brown, was an officer of the Houston Police Department and is active with the Texas InfraGard, the Information Systems Security Association, the American Society for Industrial Security, the High Technology Computer Investigation Association and others. He was also a contributor to the National Institute of Justice’s _Electronic Crime Scene Investigation: A Guide for First Responders_.The February 2004 issue of _CyberBits_ has an overview of steganography by Angelique Grado. She points out that a key difference between encryption and steganography is that ciphertext is usually immediately recognizable as such. In contrast, the text concealed through steganography is usually unnoticed. This property of being covert is similar to encoded messages, where common words or phrases mean something else according to a code book; used carefully, a code can pass as ordinary text, too.The article on page 4 (the last page) of the newsletter looks at video-game consoles as a source of forensic evidence. Author Terry Landry emphasizes that with their powerful processors, high-capacity disks and network connections – for example, an Xbox console with a 733-MHz Intel Processor, RAM, a 10G-byte hard disk, a DVD drive, and an Ethernet port capable of connecting to a broadband Internet connection – these units hardly qualify as “just a game.” He reports that there are many tools on the Internet for running Linux on these “toys” and that therefore investigators should not ignore them if they see such units during a search for evidence. He writes that he knows of one investigation where an “old Sega Dreamcast game system was modified and then connected to a corporate network and used to harvest sensitive corporate data, but was overlooked by IT security simply because no one suspected a seemingly harmless video game sitting on an employee’s desk.”I am looking forward to the next issues of CyberBits and hope that those of you with an interest in forensics will enjoy the newsletter. [I have no association with CyberEvidence, other than checking with Paul Brown that it would be OK to publicize his newsletter.] Related content how-to Doing tricks on the Linux command line Linux tricks can make even the more complicated Linux commands easier, more fun and more rewarding. By Sandra Henry-Stocker Dec 08, 2023 5 mins Linux news TSMC bets on AI chips for revival of growth in semiconductor demand Executives at the chip manufacturer are still optimistic about the revenue potential of AI, as Nvidia and its partners say new GPUs have a lead time of up to 52 weeks. By Sam Reynolds Dec 08, 2023 3 mins CPUs and Processors Technology Industry news End of road for VMware’s end-user computing and security units: Broadcom Broadcom is refocusing VMWare on creating private and hybrid cloud environments for large enterprises and divesting its non-core assets. By Sam Reynolds Dec 08, 2023 3 mins Mergers and Acquisitions news analysis IBM cloud service aims to deliver secure, multicloud connectivity IBM Hybrid Cloud Mesh is a multicloud networking service that includes IT discovery, security, monitoring and traffic-engineering capabilities. By Michael Cooney Dec 07, 2023 3 mins Network Security Network Security Network Security Podcasts Videos Resources Events NEWSLETTERS Newsletter Promo Module Test Description for newsletter promo module. Please enter a valid email address Subscribe