Books
Most Recent
 
Read More
2017-03-28

Advanced Threat Analytics Playbook

Microsoft Advanced Threat Analytics Team shared the book How to simulate and detect attacks with the Advanced Threat Analytics Playbook.

 

107
 
Read More
2017-02-05

Intelligence – Driven Incident Response

Cyber attacks occur everywhere. Combating threats and maintain service availability even cyber attacks have become more secretive and resistant. Threat intelligence is becoming more common and important in recent years. In spite of this, many experts do not stop there, and try to understand how to apply this intelligence in their operations and organizations.

 

108
 
Read More
2016-09-27

Contemporary Digital Forensic Investigations of Cloud and Mobile Applications

Contemporary Digital Forensic Investigations of Cloud and Mobile Applications comprehensively discusses the implications of cloud (storage) services and mobile applications on digital forensic investigations. The book provides both digital forensic practitioners and researchers with an up-to-date and advanced knowledge of collecting and preserving electronic evidence from different types of cloud services, such as digital remnants of cloud applications accessed through mobile devices.

156
 
Read More
2016-09-27

Second Edition of Learning iOS Forensics is Announced

Second edition of award-winning mobile forensics book by Mattia Epifani and Pasquale Stirparo – Learning iOS Forensics, – is announced by Packt Publishing.

187
Latest Headlines
 
Read More
95
 
Read More
70
 
Read More
47

Trending Topics
digital forensics
computer forensics
mobile forensics
Articles
DFIR
digital forensics software
Android forensics
windows forensics
iOS forensics
Top Stories
 
 
Right Now
 
bstrings 1.0 released
Top Five
Heat Index
 
1
Decrypting encrypted WhatsApp databases without the key
 
2
Chip-off Technique in Mobile Forensics
 
3
How to Make the Forensic Image of the Hard Drive
 
4
Extracting WhatsApp database and the cipher key from a non-rooted Android device
 
5
Extracting data from a damaged iPhone via chip-off technique