How to
Most Recent
 
Read More
2017-07-06

How to enable and disable SMB

Microsoft has published a guide to enable and disable the server message block (SMB). The vulnerability in SMB was exploited by viruses of extortionists (ransomare) for attacks on many computers in different parts of the world. An example of such a virus is Petya.

 

 
Read More
2017-06-27

How to find malware with Sysinternals

Dimitrios Margaritis is an IT security officer in the European Economic and Social Committee. He holds a degree in Computer Science from the University of Piraeus and a Diploma in Management from Henley Management College.

Government organizations are usually a complex object of opponents, and traditional methods of detection are not very effective. In this presentation, the authors tried to provide an overview of free tools and methods that were implemented in high-risk environments that are constantly being attacked. It will give detailed information about the use of Microsoft Sysmon and Powershell log data for detection – the ability to search from host-based [...]

2
 
Read More
2017-06-17

10 ways to prevent breaches and minimise impact

Attackers are increasingly adapting to security features. Now they rely less on malicious programs and administrative tools built into operating systems, but use tools such as PowerShell to bypass security systems. Cyber advocates need to know that attackers are increasingly breaking the brink of branch offices or overseas office networks, they can use various methods to jump into the main network and use undisclosed vulnerabilities in public portals, such as resetting the password for portals. Ilyas described how cyber-defenders can prevent an invasion and minimize the impact:

 

1
 
Read More
2017-06-14

How to protect your Apple iCloud account

Stephen J. Vaughan-Nyhols described three things that must be done first to protect your Apple account, ICloud in his blog. This is what he proposes:

Latest Headlines
 
Read More
3
 
Read More
3
 
Read More

Trending Topics
digital forensics
mobile forensics
Articles
computer forensics
Android forensics
digital forensics software
DFIR
iOS forensics
forensic data recovery
Top Stories
 
 
Right Now
 
bstrings 1.0 released
Top Five
Heat Index
 
1
Decrypting encrypted WhatsApp databases without the key
 
2
Chip-off Technique in Mobile Forensics
 
3
Extracting WhatsApp database and the cipher key from a non-rooted Android device
 
4
Extracting data from a damaged iPhone via chip-off technique
 
5
Free Course: Investigating Cybersecurity Incidents