Articles
Most Recent
 
Read More
2017-08-05

Removing Crypto-Mining Malware with SysInternals Tools

Chris Lazari is an IT and Management Professional with over 20 years of experience in the IT industry. The Internet is his work. Chris says that he had a Hyper-V server in his work, ordered in the data center for a particular project. He immediately choked something wrong, and loaded and run the Sysinternals Process Explorer to see if it’s possible to determine what causes the performance problem.

 

2
 
Read More
2017-06-22

Apple iOS Vulnerabilities – Zero Day Attacks

August 12, 2016 Ahmed Mansour, human rights defender of the United Arab Emirates, received a malicious SMS message on his iPhone 6 (running iOS 9.3.3). The team at the Citizen Lab of the University of Toronto came to the conclusion that Mansoor had been targeted by a combined package of three zero-day exploits capable of taking control of his phone, and spying on his emails, text messages, calls, and contact lists – an assault Which Lookout’s vice president of security research and response, Mike Murray described as showing “an incredible level of sophistication and commitment.”, analyzing this message.

 

2
 
Read More
2017-06-21

Electronic Evidence where to find in Files

Today we will talk about Electronic Evidence, where you can find in the files.

 

1
 
Read More
2017-06-19

Machine Learning in Cybersecurity

Cybersecurity industry has always been under constant strain from malicious programs and cyber-criminals. With increasing integration of software services and hardware, into every aspect of our lives, the task of keeping data secure has now become more tedious. The arsenal of tools that cyber criminals today have at their disposal has raised several concerns for security companies.

Latest Headlines
 
Read More
3
 
Read More
3
 
Read More

Trending Topics
digital forensics
mobile forensics
Articles
computer forensics
Android forensics
digital forensics software
DFIR
iOS forensics
forensic data recovery
Top Stories
 
 
Right Now
 
bstrings 1.0 released
Top Five
Heat Index
 
1
Decrypting encrypted WhatsApp databases without the key
 
2
Chip-off Technique in Mobile Forensics
 
3
Extracting WhatsApp database and the cipher key from a non-rooted Android device
 
4
Extracting data from a damaged iPhone via chip-off technique
 
5
Free Course: Investigating Cybersecurity Incidents