Posts Tagged ‘malware forensics’

Most Recent
 
Read More
2018-04-16

Creating a digital forensic laboratory: Tips and Tricks

Creating a digital forensic laboratory is a responsible step. The effectiveness of the laboratory depends on what software, hardware and equipment will be purchased.

DFC specialists took part in the creation and upgrade of several digital forensic laboratories owned by state organizations and private entities and today they will share their tips and tricks.

1146
 
Read More
2018-03-31

Inside iCloud Drive

Special cloud storage iCloud Drive appeared with the release of the eighth version of iOS. iCloud Drive is a new technology for storing data in the “cloud” storage, which replaced the usual standard synchronization of user data with the iCloud account. With the “drive” prefix, the storage capabilities of Apple have significantly expanded.

66
 
Read More
2018-03-26

How to detect proxies and network traffic with Volatility

There are several options for how to solve the effect of an opaque proxy server on network connections. This blog is obsessed with how you can solve this problem by volatility and lines.

40
 
Read More
2018-03-22

New types of android malware have detected

Android OS is one of the most vulnerable to viruses platforms. This is confirmed by the increasingly pop-up news about various viruses and vulnerabilities.

34
Latest Headlines
 
Read More
586
 
Read More
1146
 
Read More
66

Trending Topics
digital forensics
computer forensics
mobile forensics
Articles
DFIR
digital forensics software
Android forensics
windows forensics
incident response
Top Stories
 
 
Right Now
 
bstrings 1.0 released
Top Five
Heat Index
 
1
Decrypting encrypted WhatsApp databases without the key
 
2
How to Make the Forensic Image of the Hard Drive
 
3
Chip-off Technique in Mobile Forensics
 
4
Extracting data from SmartSwitch backups
 
5
Extracting WhatsApp database and the cipher key from a non-rooted Android device