Posts Tagged ‘computer forensics’

Most Recent
 
Read More
2018-12-18

Cybersecurity: five mistakes, which help hackers, compromise companies.

At the end of the year, it is customary to sum up, so today we will tell you about the mistakes that companies make when countering cyber threats. In total, our report contains a description of the five most common errors encountered by our forensic specialists this year when investigating cyber incidents.

4
 
Read More
2018-12-16

How to save your smartphone from malware

Malware authors are constantly inventing new tricks, checking the Android users’ vigilance.

13
 
Read More
2018-12-09

Cyber Threats: Social Networks

Last autumn, a private data base appeared on the Internet. Hacken’s specialists did not identify the source of the leak, but after conducting an audit of unprotected storage facilities, they assumed that the bases were compromised by a canadian company. А сomment on this issue from the company has not followed.

32
 
Read More
2018-12-04

How to delete malware from your Mac

Apple Inc. is one of the leaders of the global information market. The company develops products, monitors applications for  its devices.

42
Latest Headlines
 
Read More
13
 
Read More
71
 
Read More
275

Trending Topics
digital forensics
computer forensics
Articles
mobile forensics
DFIR
digital forensics software
Android forensics
windows forensics
incident response
Top Stories
 
 
Right Now
 
bstrings 1.0 released
Top Five
Heat Index
 
1
Decrypting encrypted WhatsApp databases without the key
 
2
How to Make the Forensic Image of the Hard Drive
 
3
Extracting data from SmartSwitch backups
 
4
Forensic tools for your Mac
 
5
Chip-off Technique in Mobile Forensics