How to
Most Recent
 
Read More
2017-12-02

How to detect Cobalt

Security goes to the first plan recently. Microsoft Office is the most widely used office suite in the world. Unfortunately, it contains vulnerabilities that pose a serious security problem.

 

35
 
Read More
2017-11-01

How to detect malware from USB Devices

James Hubben collected information after work on several occasions with suspicious USB-devices. James came to the conclusion that this threat is very widely underestimated as a result of the collection of information.

 

47
 
Read More
2017-10-22

How to decrypt files after a ransomware attack

Attacks using encryption viruses have become a true trend in 2017. Such attacks were recorded a lot, but the loudest of them were WannaCry and NotPetya. Restoring hard disks encrypted with Petya / NotPetya is a tedious, but possible, task.

 

54
 
Read More
2017-10-02

How to root Samsung Galaxy S7

Alen Gojak shared a short video about How to root Samsung Galaxy S7 edge SM-G935F on Android 7.0 Nougat. Root without tripping knox.

 

214
Latest Headlines
 
Read More
95
 
Read More
70
 
Read More
47

Trending Topics
digital forensics
computer forensics
mobile forensics
Articles
DFIR
digital forensics software
Android forensics
windows forensics
iOS forensics
Top Stories
 
 
Right Now
 
bstrings 1.0 released
Top Five
Heat Index
 
1
Decrypting encrypted WhatsApp databases without the key
 
2
Chip-off Technique in Mobile Forensics
 
3
How to Make the Forensic Image of the Hard Drive
 
4
Extracting WhatsApp database and the cipher key from a non-rooted Android device
 
5
Extracting data from a damaged iPhone via chip-off technique