Posts Tagged ‘fraud’

Most Recent
 
Read More
2018-11-23

A complex form of mobile phone fraud you should know about

One of the most popular types of crime is fraud with smartphones. Smartphones store a lot of personal information, from photos to money. Only attentiveness and sanity of citizens can help to prevent fraud. Anybody can become a victim of fraudsters: businessmen, public officials, show business stars and ordinary citizens.

121
 
Read More
2018-03-15

CorelDRAW Forensics: step by step

CorelDRAW is the best graphics editor, which is developed by a Canadian company Corel Corporation. This graphics editor has great functionality. Criminals can use it for illegal activities, such as fraud, money counterfeiting, etc. Today, we will describe how to detect CoralDRAW artefacts when examining a computer. We will use AXIOM by Magnet Forensics as a tool for analysis, which is one of the best tools for computer forensics.

546
 
Read More
2017-04-18

“Hello. Team of TeamViewer is calling you… “. An anthology of the attack.

The systems of protecting computers and networks are becoming more perfect every day. It’s harder for hackers to find a way to access data on someone else’s computer. A man remains the weakest link in cyber security. Not without reason 95 attacks on computer systems and networks begin with phishing ones. An example of such an attack observed in the last few months is mass mailings of infected Office documents. Thus, hackers try to intercept control on Windows and MacOS computers.

 

 

546
Latest Headlines
 
Read More
724
 
Read More
396
 
Read More
775

Trending Topics
digital forensics
computer forensics
Articles
mobile forensics
DFIR
digital forensics software
Android forensics
windows forensics
incident response
Top Stories
 
 
Right Now
 
bstrings 1.0 released
Top Five
Heat Index
 
1
Decrypting encrypted WhatsApp databases without the key
 
2
How to Make the Forensic Image of the Hard Drive
 
3
Extracting data from SmartSwitch backups
 
4
Forensic tools for your Mac
 
5
An Overview of Web Browser Forensics