Posts Tagged ‘malware forensics’

Most Recent
Read More

An Overview of Web Browser Forensics

Browser Forensics Analysis is a separate, large area of ​​expertise.


Web browsers are used in mobile devices, tablets, netbooks, desktops, etc., and often can be used not just for web surfing, but for navigation through the file system of the device. The web browser’s cache can contain downloaded images, videos, documents, executable files and scripts. Web browsers also can contain data entered into forms: search queries, logins and passwords for web email accounts, social networks, other web sites and financial information (for example, credit card numbers). Favorites and searches can give the researcher an idea of ​​the device owner’s interests.

Read More

Creating a digital forensic laboratory: Tips and Tricks

Creating a digital forensic laboratory is a responsible step. The effectiveness of the laboratory depends on what software, hardware and equipment will be purchased.

DFC specialists took part in the creation and upgrade of several digital forensic laboratories owned by state organizations and private entities and today they will share their tips and tricks.

Read More

Inside iCloud Drive

Special cloud storage iCloud Drive appeared with the release of the eighth version of iOS. iCloud Drive is a new technology for storing data in the “cloud” storage, which replaced the usual standard synchronization of user data with the iCloud account. With the “drive” prefix, the storage capabilities of Apple have significantly expanded.

Read More

How to detect proxies and network traffic with Volatility

There are several options for how to solve the effect of an opaque proxy server on network connections. This blog is obsessed with how you can solve this problem by volatility and lines.

Latest Headlines
Read More
Read More
Read More

Trending Topics
digital forensics
computer forensics
mobile forensics
digital forensics software
Android forensics
windows forensics
incident response
Top Stories
Right Now
bstrings 1.0 released
Top Five
Heat Index
Decrypting encrypted WhatsApp databases without the key
How to Make the Forensic Image of the Hard Drive
Extracting data from SmartSwitch backups
Chip-off Technique in Mobile Forensics
Forensic tools for your Mac