Latest Headlines
 
Read More
173
 
Read More
111
 
Read More
352

Trending Topics
digital forensics
computer forensics
Articles
mobile forensics
DFIR
digital forensics software
Android forensics
windows forensics
incident response
The News
Most Recent
 
Read More
2019-03-20

What is Ryuk?

These days encryptors are very popular and have many varieties. The hackers’ appetites are growing and more advanced counterparts are coming to replace the extortionist WannaCry. The young Ryuk hybrid virus is a trend of 2019.

23
 
Read More
2019-03-14

Governments vs. Hackers

It is necessary to continue developing security measures, as the level of cyber threats grows every year. The new tender of the European Commission speaks about a program to increase cyber-resistance to Eastern Partnership countries. The European Union allocates more than 3.2 million euros for the development of this program.

29
 
Read More
2019-03-07

Can ThreadX RTOS be compromised?

Express Logic has developed a real-time operating system (RTOS) that runs on various platforms and devices.

26
 
Read More
2019-02-21

Will WannaCry be back?

There was a rapid growth of encryption programs in 2017. The most striking attacks were WannaCry, exPetr and BadRabbit. The attacks were aimed at businesses, and cyber security experts are looking for a way to stop the spread of the virus. Experts say that WannaCry has not been destroyed yet.

65
 
Read More
2019-02-05

A Smartphone Makes A Great Witness

You may not know this, but your cellphone is a little spy.

As you go through your day, your smartphone collects evidence that can be used to recreate your activity. If you take a photo or video, the phone records when and where. All your calls and text messages are logged. Surfing the internet on your phone? Your searches and visited websites are recorded (That’s true even if you are browsing incognito.) GPS data and WiFi connections can pinpoint the places you go.

201
 
Read More
2019-01-28

New Techniques In Fighting Sextortion And Online Blackmail

One of the fastest growing wrinkles in online crime is called “sextortion.” People are lured into sharing extremely personal photos or videos in an online conversation they think will remain private – only to find out they must pay blackmail money to keep those compromising images from being shared with a spouse or a boss. Those pictures might even end up on a website or all over social media if the blackmail isn’t paid.

Sextortion has been around for a while, but it has grown in frequency in recent years as people spend more and more time online.

148
 
Read More
2019-01-22

The best time to respond to a data breach is before it happens

No matter how well you train your people, and no matter how carefully you safeguard sensitive data and information, a data breach can happen.

If you already have a solid Incident Response Plan (IRP) in place, there is no need to panic. It will tell you what to do to get things under control again. If you do not already have such a plan, form one now. Contact experienced, certified professionals immediately and let them guide you through the proper steps.

If you have a plan in place, you know that step one is to notify your company’s operations professionals and business stakeholders immediately when a breach occurs. The next step is to follow your company’s IRP. The [...]

72
Load More
End of the line!
Top Stories
 
 
Right Now
 
bstrings 1.0 released
News
 
What is Ryuk?
 
Governments vs. Hackers
 
Can ThreadX RTOS be compromised?
 
Will WannaCry be back?
More
Articles
 
A Smartphone Makes A Great Witness
 
New Techniques In Fighting Sextortion And Online Blackmail
 
The best time to respond to a data breach is before it happens
 
Cybersecurity: Five mistakes that help hackers, compromise companies
More
Books
 
Advanced Threat Analytics Playbook
 
Intelligence – Driven Incident Response
 
Contemporary Digital Forensic Investigations of Cloud and Mobile Applications
 
Second Edition of Learning iOS Forensics is Announced
More
How to
 
Must Read:Get The Most From Your Security Cameras
 
How to update MacOS by Terminal
 
How to install Splunk Enterprise
 
How to Develop an Incident Response Plan
More
Software
 
ReversingLabs plugin for Autopsy
 
How to use sandboxes without technical skills
 
VMRay Analyzer
 
Detecting malware with yara scripts
More

Popular Now
 
 
 
 
 
The Latest
 
Read More
23
Editor's Picks
 
 
 
 
Go To
SORT
 
A Smartphone Makes A Great Witness