Mac OS X security: investigating security breaches and illegal use
Knowing how to investigate a security breach, potential crime, or policy violation on a Mac computer or server is crucial for understanding the incident and building a chain of evidence that clearly identifies the culprit. In this article, Ryan Faas describes data forensic methods as they apply to Mac OS X and shows you how to ensure that evidence on a compromised Mac is not contaminated during an investigation.
[ Read more ]
Reading our newsletter every Monday will keep you up-to-date with security news.
Receive a daily digest of the latest security news.