Most Recent
Read More

Phishing Attacks: Here’s How They Hook You

Odds are, everyone in your workplace has been warned about opening suspicious-looking emails. You probably know that clicking a link in a malicious email can open your company’s network up to a data breach or some other kind of network attack. Word gets around.

Even so, these attacks—known as “phishing”—continue, and they often work. Someone sends you an email and includes a link that could end up compromising your company if just one employee clicks on it or provides the sensitive information sought.

If everyone’s guard is up, how do malicious actors entice you to click on the link? Here are a few common tactics:

The email seems to be from an authoritative [...]

Read More

FBI Says Online Blackmail is on the Rise

Online blackmail is happening more frequently these days, according to the FBI’s Internet Crime Complaint Center.

The IC3 reports an increase in extortion attempts received via email and postal mail, often using the victim’s specific user information to add authenticity. The “recipient’s personal information is noted in the email or letter to add a higher degree of intimidation to the scam. For example, a recipient’s user name or password is provided at the beginning of the email or letter,” the FBI reports.

Read More

Ransomware overview: The ‘Barack Obama’ virus

Malware that encrypts files and requires redemption for decryption is very popular now. The authors of malware are very resourceful and technologically savvy, and ransomware services are widely developing.

Read More

Get The Most From Your Security Cameras

Surveillance cameras are everywhere these days: businesses, offices, homes, parks, you name it. They collect a huge volume of evidence that can help solve traffic incidents, criminal cases or civil disputes. But are those security cameras providing the best possible evidence?

Often, camera placement issues prevent getting the best results.

Latest Headlines
Read More
Read More
Read More

Trending Topics
digital forensics
computer forensics
mobile forensics
digital forensics software
Android forensics
windows forensics
incident response
Top Stories
Right Now
bstrings 1.0 released
Top Five
Heat Index
Decrypting encrypted WhatsApp databases without the key
How to Make the Forensic Image of the Hard Drive
Extracting data from SmartSwitch backups
Chip-off Technique in Mobile Forensics
Forensic tools for your Mac