Posts Tagged ‘cloud forensics’

Most Recent
 
Read More
2018-10-01

Internet threats and children

Nowadays, children spend much of their time on the internet visiting social networks and communicating with each other using instant messengers. Therefore, some of the relationships that children face in real life are transferred into the virtual world. In this article, we will look at some of the threats to psyche and health that children may encounter online.

 

34
 
Read More
2018-09-05

MagiCube complex is used to extract data from smartphones

Modern companies develop products designed to protect the personal data of their customers. Criminals use these producst because they are confident in the security of the transmitted data. There are only a few companies that develop their own hardware and software products for digital research and information security protection. Meiya Pico is such a company.

201
 
Read More
2018-08-12

New means of protection against ransomware

Ransomware attacks are becoming bigger, more frequent – and more frighteningly inventive.

137
 
Read More
2018-07-19

An Overview of Web Browser Forensics

Browser Forensics Analysis is a separate, large area of ​​expertise.

 

Web browsers are used in mobile devices, tablets, netbooks, desktops, etc., and often can be used not just for web surfing, but for navigation through the file system of the device. The web browser’s cache can contain downloaded images, videos, documents, executable files and scripts. Web browsers also can contain data entered into forms: search queries, logins and passwords for web email accounts, social networks, other web sites and financial information (for example, credit card numbers). Favorites and searches can give the researcher an idea of ​​the device owner’s interests.

590
Latest Headlines
 
Read More
34
 
Read More
201
 
Read More
179

Trending Topics
digital forensics
computer forensics
Articles
mobile forensics
DFIR
digital forensics software
Android forensics
windows forensics
incident response
Top Stories
 
 
Right Now
 
bstrings 1.0 released
Top Five
Heat Index
 
1
Decrypting encrypted WhatsApp databases without the key
 
2
How to Make the Forensic Image of the Hard Drive
 
3
Extracting data from SmartSwitch backups
 
4
Chip-off Technique in Mobile Forensics
 
5
Forensic tools for your Mac