Latest Headlines
 
Read More
124
 
Read More
695
 
Read More
1305

Trending Topics
digital forensics
computer forensics
Articles
mobile forensics
DFIR
digital forensics software
Android forensics
windows forensics
incident response
The News
Most Recent
 
Read More
2018-08-12

New means of protection against ransomware

Ransomware attacks are becoming bigger, more frequent – and more frighteningly inventive.

82
 
Read More
2018-07-24

GrafKey Overview

Cybercrime is gaining momentum, and cybercriminals are developing new methods and gadgets for hacking. But law enforcement agencies do not doze.

124
 
Read More
2018-07-19

An Overview of Web Browser Forensics

Browser Forensics Analysis is a separate, large area of ​​expertise.

 

Web browsers are used in mobile devices, tablets, netbooks, desktops, etc., and often can be used not just for web surfing, but for navigation through the file system of the device. The web browser’s cache can contain downloaded images, videos, documents, executable files and scripts. Web browsers also can contain data entered into forms: search queries, logins and passwords for web email accounts, social networks, other web sites and financial information (for example, credit card numbers). Favorites and searches can give the researcher an idea of ​​the device owner’s interests.

296
 
Read More
2018-07-12

What you should know about ransomware

A huge number of new viruses appear every year in the world, some of which cause notable harm not only to ordinary people, but also to large firms. About 90 million new viruses were created in the world in 2017, and about 300,000 are created daily.

110
 
Read More
2018-06-25

Data recovery after ransomware that encrypts files

The problem of data recovery after ransomware that encrypts files has increased, with more and more cases recently. Help in these cases is not a trivial task.

 

Let’s consider some sides of this problem. Ransomware usually encrypts the most-used data such as photos, videos, office files, databases, etс. Ransomwares can give different extensions to encrypted data; they are considered as a same mechanism that uses similar algorithms.

353
 
Read More
2018-06-24

Skills and Knowledge in Digital Forensics

Cybercrimes cover a broad spectrum, from email scams to downloading copyrighted works for distribution, and are fueled by a desire to profit from another person’s intellectual property or private information.

266
 
Read More
2018-06-19

Hackers go after small businesses, too

So, you think your business is too small to be of interest to hackers?

You’re wrong. So, so wrong.

Recent data breaches have hit large corporations and medical providers, and those organizations are constantly taking steps to beef up their cyber security. That’s smart; they know they are targets.

Those cases make headlines, too, because they typically affect millions of customers and cost companies thousands, if not millions, of dollars to address.

But attacks against smaller businesses don’t often make such a big splash in the news, so many small business owners don’t believe they are targets. But they are. Consider this, from an October 2017 report in [...]

53
Load More
End of the line!
Top Stories
 
 
Right Now
 
bstrings 1.0 released
News
 
New means of protection against ransomware
 
GrafKey Overview
 
Hackers go after small businesses, too
 
Must Read:What can you do about online harassment?
More
Articles
 
An Overview of Web Browser Forensics
 
What you should know about ransomware
 
Data recovery after ransomware that encrypts files
 
Skills and Knowledge in Digital Forensics
More
Books
 
Advanced Threat Analytics Playbook
 
Intelligence – Driven Incident Response
 
Contemporary Digital Forensic Investigations of Cloud and Mobile Applications
 
Second Edition of Learning iOS Forensics is Announced
More
How to
 
How to update MacOS by Terminal
 
How to install Splunk Enterprise
 
How to Develop an Incident Response Plan
 
How to create a list of all the files inside a macOS directory
More
Software
 
ReversingLabs plugin for Autopsy
 
How to use sandboxes without technical skills
 
VMRay Analyzer
 
Detecting malware with yara scripts
More

Popular Now
 
 
 
 
 
The Latest
 
Read More
82
Editor's Picks
 
 
 
 
Go To
SORT
 
An Overview of Web Browser Forensics