Books
Most Recent
 
Read More
2017-03-28

Advanced Threat Analytics Playbook

Microsoft Advanced Threat Analytics Team shared the book How to simulate and detect attacks with the Advanced Threat Analytics Playbook.

 

70
 
Read More
2017-02-05

Intelligence – Driven Incident Response

Cyber attacks occur everywhere. Combating threats and maintain service availability even cyber attacks have become more secretive and resistant. Threat intelligence is becoming more common and important in recent years. In spite of this, many experts do not stop there, and try to understand how to apply this intelligence in their operations and organizations.

 

75
 
Read More
2016-09-27

Contemporary Digital Forensic Investigations of Cloud and Mobile Applications

Contemporary Digital Forensic Investigations of Cloud and Mobile Applications comprehensively discusses the implications of cloud (storage) services and mobile applications on digital forensic investigations. The book provides both digital forensic practitioners and researchers with an up-to-date and advanced knowledge of collecting and preserving electronic evidence from different types of cloud services, such as digital remnants of cloud applications accessed through mobile devices.

123
 
Read More
2016-09-27

Second Edition of Learning iOS Forensics is Announced

Second edition of award-winning mobile forensics book by Mattia Epifani and Pasquale Stirparo – Learning iOS Forensics, – is announced by Packt Publishing.

162
Latest Headlines
 
Read More
 
Read More
 
Read More
26

Trending Topics
digital forensics
computer forensics
mobile forensics
Articles
digital forensics software
DFIR
Android forensics
iOS forensics
iphone forensics
Top Stories
 
 
Right Now
 
bstrings 1.0 released
Top Five
Heat Index
 
1
Chip-off Technique in Mobile Forensics
 
2
Extracting WhatsApp database and the cipher key from a non-rooted Android device
 
3
Extracting data from a damaged iPhone via chip-off technique
 
4
Free Course: Investigating Cybersecurity Incidents
 
5
Extracting data from a damaged iPhone via chip-off technique – Part 2