MENU

Posts Tagged ‘how to’

Most Recent
 
Read More
2018-11-24

The Bot

Attackers use all sorts of tricks to get hold of a user’s data and demand a ransom. Today, many new viruses that help cybercriminals have been developed. At the same time, the old proven methods still work.

163
 
Read More
2018-09-23

Is data recovery possible after ransomware?

Specialists from foreign countries and other users started to seek advice after reading this article. Turns out, not all of you understand when forensics engineers can help recover data. In this article we will consider typical questions and give answers based on own experience.

937
 
Read More
2018-08-21

Popular Cryptocurrency Miners

Bitcoin is the most famous cryptocurrency, and the oldest one. Previously, it could be mined using a home computer. It was even possible to use your laptop. Then the situation shifted to the use of GPUs as the complexity of cryptocurrency mining increased. At present, you need specialized intelligent equipment.

109
 
Read More
2018-07-19

An Overview of Web Browser Forensics

Browser Forensics Analysis is a separate, large area of ​​expertise.

 

Web browsers are used in mobile devices, tablets, netbooks, desktops, etc., and often can be used not just for web surfing, but for navigation through the file system of the device. The web browser’s cache can contain downloaded images, videos, documents, executable files and scripts. Web browsers also can contain data entered into forms: search queries, logins and passwords for web email accounts, social networks, other web sites and financial information (for example, credit card numbers). Favorites and searches can give the researcher an idea of ​​the device owner’s interests.

14480
Latest Headlines
 
Read More
880
 
Read More
462
 
Read More
896

Trending Topics
digital forensics
computer forensics
Articles
mobile forensics
DFIR
Android forensics
digital forensics software
windows forensics
forensic data recovery
Top Stories
 
 
Right Now
 
bstrings 1.0 released
Top Five
Heat Index
 
1
Decrypting encrypted WhatsApp databases without the key
 
2
How to Make the Forensic Image of the Hard Drive
 
3
Extracting data from SmartSwitch backups
 
4
Forensic tools for your Mac
 
5
Android forensic analysis with Autopsy

Get Help Now

Thank you for contacting us.
Your Digital Investigator will call you shortly.