Posts Tagged ‘email forensics’

Most Recent
 
Read More
2017-08-26

How to change an email message AFTER it has been sent

According to a new study it was revealed that hackers can change emails after they have been sent to the Inbox. The attack scenario allows malicious parties to alter what is displayed in an email, such as editing text or swapping a harmless URL with a link to malware.

44
 
Read More
2017-08-13

Email Headers Analysis

Bala Ganesh shared good article about Email Header Analisys.

139
 
Read More
2017-03-09

The Sample of Bank Phishing Incident Analysis

Everyone at least once received phishing attacks via e-mail. Thanks to modern anti-spam technologies, most of these messages are blocked before entering our mailboxes. Fio in his post conducts an analysis of Bank Phishing Incident. He examines where the phishing comes from. That phishing messages are rarely ever sent using the attacker’s own infrastructure. And also he says that you can get some juicy information from the e-mail headers, when analyzing it.

 

69
 
Read More
2017-01-24

D3pak Kumar Glossary

D3pak Kumar shared his version of the Glossary. The glossary contains a lot of terms of computer forensics and email forensics.

 

89
Latest Headlines
 
Read More
94
 
Read More
70
 
Read More
47

Trending Topics
digital forensics
computer forensics
mobile forensics
Articles
DFIR
digital forensics software
Android forensics
windows forensics
iOS forensics
Top Stories
 
 
Right Now
 
bstrings 1.0 released
Top Five
Heat Index
 
1
Decrypting encrypted WhatsApp databases without the key
 
2
Chip-off Technique in Mobile Forensics
 
3
How to Make the Forensic Image of the Hard Drive
 
4
Extracting WhatsApp database and the cipher key from a non-rooted Android device
 
5
Extracting data from a damaged iPhone via chip-off technique