ByViktor SobieckiDecember 10, 2024Recover deleted files and previous versions of existing filesNews & Updates on Cybersecurity, Sextortion, Blackmail, and Online Scams
ByViktor SobieckiDecember 10, 2024New iTunes backup format with iOS 10News & Updates on Cybersecurity, Sextortion, Blackmail, and Online Scams
ByViktor SobieckiDecember 10, 2024Automater – IP & URL OSINT ToolCybersecurity Tips, Services, and Key Resources for Cybercrime Victims
ByViktor SobieckiDecember 10, 2024Oletools now parses obfuscated objects in RTF filesNews & Updates on Cybersecurity, Sextortion, Blackmail, and Online Scams
ByViktor SobieckiDecember 10, 2024TSK 4.3.0 and Autopsy 4.1.0 releasedCybersecurity Tips, Services, and Key Resources for Cybercrime Victims
ByViktor SobieckiDecember 10, 2024Timesketch 2016.7 releasedCybersecurity Tips, Services, and Key Resources for Cybercrime Victims
ByViktor SobieckiDecember 10, 2024Automate memory forensics analysis with VortessenceCybersecurity Tips, Services, and Key Resources for Cybercrime Victims
ByViktor SobieckiDecember 10, 2024Conference materials: Digital Forensics & Incident Response Summit 2016News & Updates on Cybersecurity, Sextortion, Blackmail, and Online Scams
ByViktor SobieckiDecember 10, 2024Elcomsoft iOS Forensic Toolkit Adds Logical AcquisitionCybersecurity Tips, Services, and Key Resources for Cybercrime Victims
ByViktor SobieckiDecember 10, 2024WhatsApp ViewerCybersecurity Tips, Services, and Key Resources for Cybercrime Victims