Posts Tagged ‘how to’

Most Recent
 
Read More
2019-03-20

What is Ryuk?

These days encryptors are very popular and have many varieties. The hackers’ appetites are growing and more advanced counterparts are coming to replace the extortionist WannaCry. The young Ryuk hybrid virus is a trend of 2019.

686
 
Read More
2019-03-14

Governments vs. Hackers

It is necessary to continue developing security measures, as the level of cyber threats grows every year. The new tender of the European Commission speaks about a program to increase cyber-resistance to Eastern Partnership countries. The European Union allocates more than 3.2 million euros for the development of this program.

245
 
Read More
2019-02-21

Will WannaCry be back?

There was a rapid growth of encryption programs in 2017. The most striking attacks were WannaCry, exPetr and BadRabbit. The attacks were aimed at businesses, and cyber security experts are looking for a way to stop the spread of the virus. Experts say that WannaCry has not been destroyed yet.

152
 
Read More
2019-01-20

How to detect fake Amazon Echo apps

More and more “smart” gadgets are being invented. The most popular Christmas gift this year was “smart” speakers from Amazon.

81
Latest Headlines
 
Read More
374
 
Read More
226
 
Read More
512

Trending Topics
digital forensics
computer forensics
Articles
mobile forensics
DFIR
digital forensics software
Android forensics
windows forensics
incident response
Top Stories
 
 
Right Now
 
bstrings 1.0 released
Top Five
Heat Index
 
1
Decrypting encrypted WhatsApp databases without the key
 
2
How to Make the Forensic Image of the Hard Drive
 
3
Extracting data from SmartSwitch backups
 
4
Forensic tools for your Mac
 
5
Android forensic analysis with Autopsy