In 2008, I wrote a blog entry, Simple Techniques That Fool Forensic Tools, that included an introduction to Alternate Data Streams. Now, I’d like to go into more detail, so that you can better understand the use and danger of
Alternate Data Streams

In 2008, I wrote a blog entry, Simple Techniques That Fool Forensic Tools, that included an introduction to Alternate Data Streams. Now, I’d like to go into more detail, so that you can better understand the use and danger of
In June of 2021, people in Massachusetts noticed a new application (app) installed on their Android cell phones, that they didn’t initiate. What an unwelcome surprise! Where did that come from? Is someone messing with my phone? Even people driving
Unstructured Data sounds like files that store disorganized data or simple text, but I see it as more of a classification term than the description of a file’s lack of internal data structures. Some examples, provided in an article by
If Dark Data is hidden, how can it be dangerous? How much of a threat can it possibly be? Dark Data is everywhere. It’s hidden in the firmware of the smallest devices, like survelance cameras, printers, TV streaming devices, your
What does Dark Data mean? We use this term on our website, as if it is obvious. In the most basic terms, Dark Data is information that is difficult to find. So, in effect it is sitting in the dark.
Welcome to our Dark Data Blog. I, Rob Zirnstein, have brought back some entries that I wrote in the past, and I plan to write new posts periodically. My intent is not to fill this blog with forced weekly posts, but