MENU

Posts Tagged ‘DFIR’

Most Recent
 
Read More
2018-12-23

History of cryptocurrency incidents

Cryptocurrency is conquering the world rapidly. It is considered that the main distinctive features of cryptocurrency are decentralization, anonymity and security. However, deception, fraud, extortion and hacking are only some of the methods that can be used to steal  your cryptocurrency.

93
 
Read More
2018-12-18

Cybersecurity: Five mistakes that help hackers, compromise companies

At the end of the year, it is customary to sum up, so today we will tell you about the mistakes that companies make when countering cyber threats. Our report describes the five most common errors encountered by our forensic specialists this year when investigating cyber incidents.

191
 
Read More
2018-12-16

How to protect your smartphone from malware

Malware authors are constantly inventing new tricks, testing the Android users’ vigilance.

880
 
Read More
2018-12-09

Cyber Threats: Social Networks

Last autumn, a private database appeared on the internet. Hacken’s specialists did not identify the source of the leak, but after conducting an audit of unprotected storage facilities, they assumed that the bases were compromised by a Canadian company. The company has not commented.

89
Latest Headlines
 
Read More
880
 
Read More
462
 
Read More
896

Trending Topics
digital forensics
computer forensics
Articles
mobile forensics
DFIR
Android forensics
digital forensics software
windows forensics
forensic data recovery
Top Stories
 
 
Right Now
 
bstrings 1.0 released
Top Five
Heat Index
 
1
Decrypting encrypted WhatsApp databases without the key
 
2
How to Make the Forensic Image of the Hard Drive
 
3
Extracting data from SmartSwitch backups
 
4
Forensic tools for your Mac
 
5
Android forensic analysis with Autopsy

Get Help Now

Thank you for contacting us.
Your Digital Investigator will call you shortly.