ByViktor SobieckiDecember 10, 2024Kirjuri – web application for managing physical forensic evidenceCybersecurity Tips, Services, and Key Resources for Cybercrime Victims
ByViktor SobieckiDecember 10, 2024NirSoft releases new event log utilities for WindowsCybersecurity Tips, Services, and Key Resources for Cybercrime Victims
ByViktor SobieckiDecember 10, 2024Alan Orlikoski’s forensic artifact parsing toolCybersecurity Tips, Services, and Key Resources for Cybercrime Victims
ByViktor SobieckiDecember 10, 2024Recon 2016 RecordingsNews & Updates on Cybersecurity, Sextortion, Blackmail, and Online Scams
ByViktor SobieckiDecember 10, 2024iOS 10 Backup Passwords are Much Easier to BreakNews & Updates on Cybersecurity, Sextortion, Blackmail, and Online Scams
ByViktor SobieckiDecember 10, 2024FireEye Labs Obfuscated String SolverCybersecurity Tips, Services, and Key Resources for Cybercrime Victims
ByViktor SobieckiDecember 10, 2024Quicklook thumbnails.data parserCybersecurity Tips, Services, and Key Resources for Cybercrime Victims
ByViktor SobieckiDecember 10, 2024OSForensics V4 Beta releaseCybersecurity Tips, Services, and Key Resources for Cybercrime Victims
ByViktor SobieckiDecember 10, 2024BooLET 1.2 releasedCybersecurity Tips, Services, and Key Resources for Cybercrime Victims
ByViktor SobieckiDecember 10, 2024Forensic tools for your MacCybersecurity Tips, Services, and Key Resources for Cybercrime Victims