Posts Tagged ‘cybersecurity’

Most Recent
Read More

An Overview of Web Browser Forensics

Browser Forensics Analysis is a separate, large area of ​​expertise.


Web browsers are used in mobile devices, tablets, netbooks, desktops, etc., and often can be used not just for web surfing, but for navigation through the file system of the device. The web browser’s cache can contain downloaded images, videos, documents, executable files and scripts. Web browsers also can contain data entered into forms: search queries, logins and passwords for web email accounts, social networks, other web sites and financial information (for example, credit card numbers). Favorites and searches can give the researcher an idea of ​​the device owner’s interests.

Read More

What you should know about ransomware

A huge number of new viruses appear every year in the world, some of which cause notable harm not only to ordinary people, but also to large firms. About 90 million new viruses were created in the world in 2017, and about 300,000 are created daily.

Read More

Data recovery after ransomware that encrypts files

The problem of data recovery after ransomware that encrypts files has increased, with more and more cases recently. Help in these cases is not a trivial task.


Let’s consider some sides of this problem. Ransomware usually encrypts the most-used data such as photos, videos, office files, databases, etс. Ransomwares can give different extensions to encrypted data; they are considered as a same mechanism that uses similar algorithms.

Read More

Skills and Knowledge in Digital Forensics

Cybercrimes cover a broad spectrum, from email scams to downloading copyrighted works for distribution, and are fueled by a desire to profit from another person’s intellectual property or private information.

Latest Headlines
Read More
Read More
Read More

Trending Topics
digital forensics
computer forensics
mobile forensics
digital forensics software
Android forensics
windows forensics
incident response
Top Stories
Right Now
bstrings 1.0 released
Top Five
Heat Index
Decrypting encrypted WhatsApp databases without the key
How to Make the Forensic Image of the Hard Drive
Chip-off Technique in Mobile Forensics
Extracting data from SmartSwitch backups
Forensic tools for your Mac