Latest Headlines
Read More
Read More
Read More

Trending Topics
digital forensics
computer forensics
mobile forensics
digital forensics software
Android forensics
windows forensics
incident response
The News
Most Recent
Read More

An Overview of Web Browser Forensics

Browser Forensics Analysis is a separate, large area of ​​expertise.


Web browsers are used in mobile devices, tablets, netbooks, desktops, etc., and often can be used not just for web surfing, but for navigation through the file system of the device. The web browser’s cache can contain downloaded images, videos, documents, executable files and scripts. Web browsers also can contain data entered into forms: search queries, logins and passwords for web email accounts, social networks, other web sites and financial information (for example, credit card numbers). Favorites and searches can give the researcher an idea of ​​the device owner’s interests.

Read More

What you should know about ransomware

A huge number of new viruses appear every year in the world, some of which cause notable harm not only to ordinary people, but also to large firms. About 90 million new viruses were created in the world in 2017, and about 300,000 are created daily.

Read More

Data recovery after ransomware that encrypts files

The problem of data recovery after ransomware that encrypts files has increased, with more and more cases recently. Help in these cases is not a trivial task.


Let’s consider some sides of this problem. Ransomware usually encrypts the most-used data such as photos, videos, office files, databases, etс. Ransomwares can give different extensions to encrypted data; they are considered as a same mechanism that uses similar algorithms.

Read More

Skills and Knowledge in Digital Forensics

Cybercrimes cover a broad spectrum, from email scams to downloading copyrighted works for distribution, and are fueled by a desire to profit from another person’s intellectual property or private information.

Read More

Hackers go after small businesses, too

So, you think your business is too small to be of interest to hackers?

You’re wrong. So, so wrong.

Recent data breaches have hit large corporations and medical providers, and those organizations are constantly taking steps to beef up their cyber security. That’s smart; they know they are targets.

Those cases make headlines, too, because they typically affect millions of customers and cost companies thousands, if not millions, of dollars to address.

But attacks against smaller businesses don’t often make such a big splash in the news, so many small business owners don’t believe they are targets. But they are. Consider this, from an October 2017 report in [...]

Read More

How to acquire a LinkedIn account for forensics

LinkedIn is a social network for finding and establishing business contacts. More than 500 million users are registered with LinkedIn. You can make a copy of the member account data using the commercial tools. For example, Oxygen Forensics. There is also a way to do this manually. This method will be described in this article.

Read More

What can you do about online harassment?

If you have not spoken out about cyberbullying, today is a great day to do so.

June 15, 2018, is designated as Stop Cyberbullying Day, an internationally recognized day of awareness and activities founded by The Cybersmile Foundation in 2012. It takes place the third Friday in June each year.

Stop Cyberbullying Day encourages people around the world to show their commitment toward an inclusive, diverse and welcoming online environment for all – without fear of personal threats, harassment or abuse. The hashtag #STOPCYBERBULLYINGDAY is used on social media to show support and to help spread the word.

At Digital Forensics Corp., we help people cope with online [...]

Load More
End of the line!
Top Stories
Right Now
bstrings 1.0 released
Hackers go after small businesses, too
Must Read:What can you do about online harassment?
Is your child being cyberbullied? Know the signs, and learn what you can do
Flash drive-sniffing dogs, warnings for retailers and burgers that may have cost you way too much
An Overview of Web Browser Forensics
What you should know about ransomware
Data recovery after ransomware that encrypts files
Skills and Knowledge in Digital Forensics
Advanced Threat Analytics Playbook
Intelligence – Driven Incident Response
Contemporary Digital Forensic Investigations of Cloud and Mobile Applications
Second Edition of Learning iOS Forensics is Announced
How to
How to update MacOS by Terminal
How to install Splunk Enterprise
How to Develop an Incident Response Plan
How to create a list of all the files inside a macOS directory
ReversingLabs plugin for Autopsy
How to use sandboxes without technical skills
VMRay Analyzer
Detecting malware with yara scripts

Popular Now
The Latest
Read More
Editor's Picks
Go To
An Overview of Web Browser Forensics