Posts Tagged ‘forensic data recovery’

Most Recent
 
Read More
2017-11-13

Hiding Registry keys

Brian Reitz is a senior threat analyst. He wanted to test the detection of various types of registry stamina. One of the methods used by the Kovter malware family. It is the perseverance trick. This trick is described in detail in a report from Symantec for September 2015 and analyzed by MalwareBytes, Airbus Cybersecurity and Reagta. The Windows Registry is an area for detecting blue commands, because the “tubeless” methods become more common.

15
 
Read More
2017-10-21

Belkasoft 8.5 has released

Belkasoft Evidence Center is an advanced solution for searching, retrieving and analyzing electronic data stored on computers and mobile devices. Software services will benefit from uniform services and experts in the field of computer forensics.

 

59
 
Read More
2017-09-22

Magnet AXIOM Cloud

Magnet Forensics is the world leader in the development of software for digital research, which acquires, analyzes and shares evidence from computers, smartphones, clouds.

24
 
Read More
2017-07-06

Hardware Forensic Database

Digital Security created new project ‘Hardware Forensic Database’. It contains information about extraction data from devices and required material to perform a forensic analysis.

 

38
Latest Headlines
 
Read More
52
 
Read More
42
 
Read More
41

Trending Topics
digital forensics
computer forensics
mobile forensics
Articles
Android forensics
digital forensics software
DFIR
iOS forensics
windows forensics
Top Stories
 
 
Right Now
 
bstrings 1.0 released
Top Five
Heat Index
 
1
Decrypting encrypted WhatsApp databases without the key
 
2
Chip-off Technique in Mobile Forensics
 
3
Extracting WhatsApp database and the cipher key from a non-rooted Android device
 
4
How to Make the Forensic Image of the Hard Drive
 
5
Extracting data from a damaged iPhone via chip-off technique