News
Most Recent
 
Read More
2017-08-21

Tools For Unpacking Malware

Today we will talk about the different ways that we use to unpack malware, and the author will share some of the tools and scripts that he often uses for this purpose. The way the order is determined largely depends on the analysis of the malware family. Sometimes it takes a lot of patience and imagination. But sometimes we can find the general behavior of malicious software, which can help us automate the task of unpacking malicious programs.

12
 
Read More
2017-08-20

NIST drops ‘federal’ from cyber controls guidance

Employees FedScoop published an article on the abolition of “federal” from the management of cybersecurity. The National Institute of Standards and Technology excluded the formulation specific to federal legislation from its important publication on cybersecurity and confidentiality. This is one of a number of proposed changes rolled out this week after a long delay.

2
 
Read More
2017-08-19

iCloud Acquisition Overview

Today, so much everything is permeated with the Internet and most are stored in the cloud. Vladimir Catal tells the story of Apple iCloud, its most famous hacks and about his own forensic efforts. He chronicles the development of iCloud and iOS Forensics.

 

5
 
Read More
2017-08-18

Ransomware Which Hides Inside JPG Files

Lawrence Abrams talks about a new discovery, which is called SyncCrypt, the security researcher Emsisoft xXToffeeXx, which is distributed using spam attachments containing WSF files. Lawrence analyzed the script, and noted that the method used to download and install Ransomware is quite interesting. This is because the WSF script will download images with embedded ZIP files that contain the necessary files to infect the computer with SyncCrypt. This method has also made the images undetectable by almost all antivirus vendors on VirusTotal.

 

9
Latest Headlines
 
Read More
2
 
Read More
1
 
Read More

Trending Topics
digital forensics
mobile forensics
Articles
computer forensics
Android forensics
digital forensics software
DFIR
iOS forensics
forensic data recovery
Top Stories
 
 
Right Now
 
bstrings 1.0 released
Top Five
Heat Index
 
1
Decrypting encrypted WhatsApp databases without the key
 
2
Chip-off Technique in Mobile Forensics
 
3
Extracting WhatsApp database and the cipher key from a non-rooted Android device
 
4
Extracting data from a damaged iPhone via chip-off technique
 
5
Free Course: Investigating Cybersecurity Incidents