Articles
Most Recent
 
Read More
2017-06-22

Apple iOS Vulnerabilities – Zero Day Attacks

August 12, 2016 Ahmed Mansour, human rights defender of the United Arab Emirates, received a malicious SMS message on his iPhone 6 (running iOS 9.3.3). The team at the Citizen Lab of the University of Toronto came to the conclusion that Mansoor had been targeted by a combined package of three zero-day exploits capable of taking control of his phone, and spying on his emails, text messages, calls, and contact lists – an assault Which Lookout’s vice president of security research and response, Mike Murray described as showing “an incredible level of sophistication and commitment.”, analyzing this message.

 

 
Read More
2017-06-21

Electronic Evidence where to find in Files

Today we will talk about Electronic Evidence, where you can find in the files.

 

 
Read More
2017-06-19

Machine Learning in Cybersecurity

Cybersecurity industry has always been under constant strain from malicious programs and cyber-criminals. With increasing integration of software services and hardware, into every aspect of our lives, the task of keeping data secure has now become more tedious. The arsenal of tools that cyber criminals today have at their disposal has raised several concerns for security companies.

 
Read More
2017-06-16

Analyzing the Fileless, Code-injecting SOREBRECT Ransomware

Fileless threats and ransomware aren’t new. Trend Micro conducted an analysis of Code-Injection SOREBRECT extortionists. When working with this virus, the samples showed SOREBRECT unusual methods that it uses to encrypt the data of its victim.

 

Latest Headlines
 
Read More
 
Read More
 
Read More
26

Trending Topics
digital forensics
computer forensics
mobile forensics
Articles
digital forensics software
DFIR
Android forensics
iOS forensics
iphone forensics
Top Stories
 
 
Right Now
 
bstrings 1.0 released
Top Five
Heat Index
 
1
Chip-off Technique in Mobile Forensics
 
2
Extracting WhatsApp database and the cipher key from a non-rooted Android device
 
3
Extracting data from a damaged iPhone via chip-off technique
 
4
Free Course: Investigating Cybersecurity Incidents
 
5
Extracting data from a damaged iPhone via chip-off technique – Part 2