Latest Headlines
 
Read More
640
 
Read More
1245
 
Read More
73

Trending Topics
digital forensics
computer forensics
Articles
mobile forensics
DFIR
digital forensics software
Android forensics
windows forensics
incident response
The News
Most Recent
 
Read More
2018-07-19

An Overview of Web Browser Forensics

Browser Forensics Analysis is a separate, large area of ​​expertise.

 

Web browsers are used in mobile devices, tablets, netbooks, desktops, etc., and often can be used not just for web surfing, but for navigation through the file system of the device. The web browser’s cache can contain downloaded images, videos, documents, executable files and scripts. Web browsers also can contain data entered into forms: search queries, logins and passwords for web email accounts, social networks, other web sites and financial information (for example, credit card numbers). Favorites and searches can give the researcher an idea of ​​the device owner’s interests.

42
 
Read More
2018-07-12

What you should know about ransomware

A huge number of new viruses appear every year in the world, some of which cause notable harm not only to ordinary people, but also to large firms. About 90 million new viruses were created in the world in 2017, and about 300,000 are created daily.

65
 
Read More
2018-06-25

Data recovery after ransomware that encrypts files

The problem of data recovery after ransomware that encrypts files has increased, with more and more cases recently. Help in these cases is not a trivial task.

 

Let’s consider some sides of this problem. Ransomware usually encrypts the most-used data such as photos, videos, office files, databases, etс. Ransomwares can give different extensions to encrypted data; they are considered as a same mechanism that uses similar algorithms.

297
 
Read More
2018-06-24

Skills and Knowledge in Digital Forensics

Cybercrimes cover a broad spectrum, from email scams to downloading copyrighted works for distribution, and are fueled by a desire to profit from another person’s intellectual property or private information.

210
 
Read More
2018-06-19

Hackers go after small businesses, too

So, you think your business is too small to be of interest to hackers?

You’re wrong. So, so wrong.

Recent data breaches have hit large corporations and medical providers, and those organizations are constantly taking steps to beef up their cyber security. That’s smart; they know they are targets.

Those cases make headlines, too, because they typically affect millions of customers and cost companies thousands, if not millions, of dollars to address.

But attacks against smaller businesses don’t often make such a big splash in the news, so many small business owners don’t believe they are targets. But they are. Consider this, from an October 2017 report in [...]

39
 
Read More
2018-06-16

How to acquire a LinkedIn account for forensics

LinkedIn is a social network for finding and establishing business contacts. More than 500 million users are registered with LinkedIn. You can make a copy of the member account data using the commercial tools. For example, Oxygen Forensics. There is also a way to do this manually. This method will be described in this article.

173
 
Read More
2018-06-15

What can you do about online harassment?

If you have not spoken out about cyberbullying, today is a great day to do so.

June 15, 2018, is designated as Stop Cyberbullying Day, an internationally recognized day of awareness and activities founded by The Cybersmile Foundation in 2012. It takes place the third Friday in June each year.

Stop Cyberbullying Day encourages people around the world to show their commitment toward an inclusive, diverse and welcoming online environment for all – without fear of personal threats, harassment or abuse. The hashtag #STOPCYBERBULLYINGDAY is used on social media to show support and to help spread the word.

At Digital Forensics Corp., we help people cope with online [...]

57
Load More
End of the line!
Top Stories
 
 
Right Now
 
bstrings 1.0 released
News
 
Hackers go after small businesses, too
 
Must Read:What can you do about online harassment?
 
Is your child being cyberbullied? Know the signs, and learn what you can do
 
Flash drive-sniffing dogs, warnings for retailers and burgers that may have cost you way too much
More
Articles
 
An Overview of Web Browser Forensics
 
What you should know about ransomware
 
Data recovery after ransomware that encrypts files
 
Skills and Knowledge in Digital Forensics
More
Books
 
Advanced Threat Analytics Playbook
 
Intelligence – Driven Incident Response
 
Contemporary Digital Forensic Investigations of Cloud and Mobile Applications
 
Second Edition of Learning iOS Forensics is Announced
More
How to
 
How to update MacOS by Terminal
 
How to install Splunk Enterprise
 
How to Develop an Incident Response Plan
 
How to create a list of all the files inside a macOS directory
More
Software
 
ReversingLabs plugin for Autopsy
 
How to use sandboxes without technical skills
 
VMRay Analyzer
 
Detecting malware with yara scripts
More

Popular Now
 
 
 
 
 
The Latest
 
Read More
42
Editor's Picks
 
 
 
 
Go To
SORT
 
An Overview of Web Browser Forensics