Latest Headlines
 
Read More
 
Read More
 
Read More
26

Trending Topics
digital forensics
computer forensics
mobile forensics
Articles
digital forensics software
DFIR
Android forensics
iOS forensics
iphone forensics
The News
Most Recent
 
Read More
2017-06-27

How to find malware with Sysinternals

Dimitrios Margaritis is an IT security officer in the European Economic and Social Committee. He holds a degree in Computer Science from the University of Piraeus and a Diploma in Management from Henley Management College.

Government organizations are usually a complex object of opponents, and traditional methods of detection are not very effective. In this presentation, the authors tried to provide an overview of free tools and methods that were implemented in high-risk environments that are constantly being attacked. It will give detailed information about the use of Microsoft Sysmon and Powershell log data for detection – the ability to search from host-based [...]

 
Read More
2017-06-25

How to make your employees care about cybersecurity

“If we look at security breaches over the last five to seven years, it’s pretty clear that people, whether it’s through accidental or intentional introduction of malware, represent the single most important point of failure in terms of security vulnerabilities,” said Eddie Schwartz, chair of ISACA’s Cyber Security Advisory Council.

 

 
Read More
2017-06-24

Why Mobile Chats Are My First Source of Information for Investigations

With a Masters in Data Forensics Management, Timothy LaTulippe has assisted in complex investigations in both the public and private sectors, working with government agencies, Fortune 100 corporations and AM Law 100 firms. He wrote a post on why mobile chat rooms are my first source of information for investigations.

 

 
Read More
2017-06-23

WANNACRY ON INDUSTRIAL NETWORKS

In mid-May 2017, many companies around the world were attacked by the WannaCry network crypto variant. The Wannacle malware spread across local networks and the Internet by exploiting the CVE-2017-0143 (MS17-010) vulnerability in components of the SMBv1 service (port TCP 445) in Windows operating systems. Since the industrial network is not directly connected to the Internet, and access is provided through the corporate network using NAT, a firewall and a corporate proxy server, which makes it impossible to infect such systems via the Internet. There are typical industrial network configuration errors, which have led to WannaCry infections, according to our data:

 

 
Read More
2017-06-22

Apple iOS Vulnerabilities – Zero Day Attacks

August 12, 2016 Ahmed Mansour, human rights defender of the United Arab Emirates, received a malicious SMS message on his iPhone 6 (running iOS 9.3.3). The team at the Citizen Lab of the University of Toronto came to the conclusion that Mansoor had been targeted by a combined package of three zero-day exploits capable of taking control of his phone, and spying on his emails, text messages, calls, and contact lists – an assault Which Lookout’s vice president of security research and response, Mike Murray described as showing “an incredible level of sophistication and commitment.”, analyzing this message.

 

 
Read More
2017-06-21

Electronic Evidence where to find in Files

Today we will talk about Electronic Evidence, where you can find in the files.

 

 
Read More
2017-06-19

Machine Learning in Cybersecurity

Cybersecurity industry has always been under constant strain from malicious programs and cyber-criminals. With increasing integration of software services and hardware, into every aspect of our lives, the task of keeping data secure has now become more tedious. The arsenal of tools that cyber criminals today have at their disposal has raised several concerns for security companies.

Load More
End of the line!
Top Stories
 
 
Right Now
 
bstrings 1.0 released
News
 
How to make your employees care about cybersecurity
 
Why Mobile Chats Are My First Source of Information for Investigations
 
WANNACRY ON INDUSTRIAL NETWORKS
 
DFIR Infographics
More
Articles
 
Apple iOS Vulnerabilities – Zero Day Attacks
 
Electronic Evidence where to find in Files
 
Machine Learning in Cybersecurity
 
Analyzing the Fileless, Code-injecting SOREBRECT Ransomware
More
Books
 
Advanced Threat Analytics Playbook
 
Intelligence – Driven Incident Response
 
Contemporary Digital Forensic Investigations of Cloud and Mobile Applications
 
Second Edition of Learning iOS Forensics is Announced
More
How to
 
How to find malware with Sysinternals
 
10 ways to prevent breaches and minimise impact
 
How to protect your Apple iCloud account
 
Understanding Mac OS full disk encryption
More
Software
 
FastIR Collector
 
Oxygen Software 9.4 has released
 
SQLite Forensics with Visual NAND Reconstructor
 
Hiberfil.sys Analysis with Hibernation Recon
More

Popular Now
 
 
 
 
 
The Latest
 
Read More
Editor's Picks
 
 
 
 
Go To
SORT
 
Apple iOS Vulnerabilities – Zero Day Attacks