Latest Headlines
 
Read More
33
 
Read More
201
 
Read More
179

Trending Topics
digital forensics
computer forensics
Articles
mobile forensics
DFIR
digital forensics software
Android forensics
windows forensics
incident response
The News
Most Recent
 
Read More
2018-10-16

Phishing Attacks: Here’s How They Hook You

Odds are, everyone in your workplace has been warned about opening suspicious-looking emails. You probably know that clicking a link in a malicious email can open your company’s network up to a data breach or some other kind of network attack. Word gets around.

Even so, these attacks—known as “phishing”—continue, and they often work. Someone sends you an email and includes a link that could end up compromising your company if just one employee clicks on it or provides the sensitive information sought.

If everyone’s guard is up, how do malicious actors entice you to click on the link? Here are a few common tactics:

The email seems to be from an authoritative [...]

7
 
Read More
2018-10-09

Has Your Computer Been Hacked? Know the Signs

Wondering if your computer or network has been hacked? Are you worried about malware or spyware?

Sometimes, computers have problems that have nothing to do with malicious activity, but hacking does happen and it is a growing problem. Visit the wrong website, open the wrong email or download the wrong app and you can find yourself with a host of problems. Risks run the gamut from someone ruining your computer to someone accessing your personal data, bank accounts and other crucial information.

It takes a computer forensics examination to determine whether you’ve been hacked and how it was done, but there are some signs you can monitor. If you encounter any of these, you [...]

49
 
Read More
2018-10-05

Are Your Routers and Switchers Opening the Way for Hackers?

Network infrastructure devices – the routers, switchers, servers, firewalls and other devices that facilitate communications on yor network – can be prime targets for hackers. Almost all network traffic crosses these crucial devices, and if one of them is compromised a hacker can do serious damage.

For example, an attacker with access to your organization’s gateway router can control traffic going in and out. He can monitor, modify or deny traffic in any direction. An attacker with access to an internal switcher can control traffic within your organization. As the U.S. Department of Homeland Security’s Computer Emergency Readiness Team puts it succinctly: Whoever controls the [...]

25
 
Read More
2018-10-01

Internet threats and children

Nowadays, children spend much of their time on the internet visiting social networks and communicating with each other using instant messengers. Therefore, some of the relationships that children face in real life are transferred into the virtual world. In this article, we will look at some of the threats to psyche and health that children may encounter online.

 

33
 
Read More
2018-09-24

FBI Says Online Blackmail is on the Rise

Online blackmail is happening more frequently these days, according to the FBI’s Internet Crime Complaint Center.

The IC3 reports an increase in extortion attempts received via email and postal mail, often using the victim’s specific user information to add authenticity. The “recipient’s personal information is noted in the email or letter to add a higher degree of intimidation to the scam. For example, a recipient’s user name or password is provided at the beginning of the email or letter,” the FBI reports.

52
 
Read More
2018-09-23

Is data recovery possible after ransomware?

Specialists from foreign countries and other users started to seek advice after reading this article. Turns out, not all of you understand when forensics engineers can help recover data. In this article we will consider typical questions and give answers based on own experience.

245
 
Read More
2018-09-21

Ransomware overview: The ‘Barack Obama’ virus

Malware that encrypts files and requires redemption for decryption is very popular now. The authors of malware are very resourceful and technologically savvy, and ransomware services are widely developing.

48
Load More
End of the line!
Top Stories
 
 
Right Now
 
bstrings 1.0 released
News
 
Phishing Attacks: Here’s How They Hook You
 
FBI Says Online Blackmail is on the Rise
 
Ransomware overview: The ‘Barack Obama’ virus
 
Must Read:Get The Most From Your Security Cameras
More
Articles
 
Phishing Attacks: Here’s How They Hook You
 
Has Your Computer Been Hacked? Know the Signs
 
Are Your Routers and Switchers Opening the Way for Hackers?
 
Internet threats and children
More
Books
 
Advanced Threat Analytics Playbook
 
Intelligence – Driven Incident Response
 
Contemporary Digital Forensic Investigations of Cloud and Mobile Applications
 
Second Edition of Learning iOS Forensics is Announced
More
How to
 
Must Read:Get The Most From Your Security Cameras
 
How to update MacOS by Terminal
 
How to install Splunk Enterprise
 
How to Develop an Incident Response Plan
More
Software
 
ReversingLabs plugin for Autopsy
 
How to use sandboxes without technical skills
 
VMRay Analyzer
 
Detecting malware with yara scripts
More

Popular Now
 
 
 
 
 
The Latest
 
Read More
7
Editor's Picks
 
 
 
 
Go To
SORT
 
Phishing Attacks: Here’s How They Hook You