Articles
Most Recent
 
Read More
2018-10-16

Phishing Attacks: Here’s How They Hook You

Odds are, everyone in your workplace has been warned about opening suspicious-looking emails. You probably know that clicking a link in a malicious email can open your company’s network up to a data breach or some other kind of network attack. Word gets around.

Even so, these attacks—known as “phishing”—continue, and they often work. Someone sends you an email and includes a link that could end up compromising your company if just one employee clicks on it or provides the sensitive information sought.

If everyone’s guard is up, how do malicious actors entice you to click on the link? Here are a few common tactics:

The email seems to be from an authoritative [...]

5
 
Read More
2018-10-09

Has Your Computer Been Hacked? Know the Signs

Wondering if your computer or network has been hacked? Are you worried about malware or spyware?

Sometimes, computers have problems that have nothing to do with malicious activity, but hacking does happen and it is a growing problem. Visit the wrong website, open the wrong email or download the wrong app and you can find yourself with a host of problems. Risks run the gamut from someone ruining your computer to someone accessing your personal data, bank accounts and other crucial information.

It takes a computer forensics examination to determine whether you’ve been hacked and how it was done, but there are some signs you can monitor. If you encounter any of these, you [...]

47
 
Read More
2018-10-05

Are Your Routers and Switchers Opening the Way for Hackers?

Network infrastructure devices – the routers, switchers, servers, firewalls and other devices that facilitate communications on yor network – can be prime targets for hackers. Almost all network traffic crosses these crucial devices, and if one of them is compromised a hacker can do serious damage.

For example, an attacker with access to your organization’s gateway router can control traffic going in and out. He can monitor, modify or deny traffic in any direction. An attacker with access to an internal switcher can control traffic within your organization. As the U.S. Department of Homeland Security’s Computer Emergency Readiness Team puts it succinctly: Whoever controls the [...]

25
 
Read More
2018-10-01

Internet threats and children

Nowadays, children spend much of their time on the internet visiting social networks and communicating with each other using instant messengers. Therefore, some of the relationships that children face in real life are transferred into the virtual world. In this article, we will look at some of the threats to psyche and health that children may encounter online.

 

32
Latest Headlines
 
Read More
32
 
Read More
201
 
Read More
179

Trending Topics
digital forensics
computer forensics
Articles
mobile forensics
DFIR
digital forensics software
Android forensics
windows forensics
incident response
Top Stories
 
 
Right Now
 
bstrings 1.0 released
Top Five
Heat Index
 
1
Decrypting encrypted WhatsApp databases without the key
 
2
How to Make the Forensic Image of the Hard Drive
 
3
Extracting data from SmartSwitch backups
 
4
Chip-off Technique in Mobile Forensics
 
5
Forensic tools for your Mac