MENU

Posts Tagged ‘office forensics’

Most Recent
 
Read More
2018-03-29

Analysis of Email Attachment Timestamps

Arman Gungor is a certified computer forensic examiner (CCE) and an e-Discovery expert with more than 21 years of experience in computer technology and technology. He is appointed as a neutral expert on computer expertise, as well as a neutral consultant on electronic discovery. In this blog, he talked about analyzing the timestamp for sending e-mail in Outlook.

397
 
Read More
2018-03-19

Word Documents with Macros Forensic Analysis

Attacks in memory are growing and attracting increasing attention. The consumer deceives the inclusion of macros in a Microsoft Office Word document that is delivered by email. Users will receive several email options, regardless of whether it has a built-in link or attachment.

702
 
Read More
2018-02-28

VBA Macro code analysis

Malware authors always find a unique way to distribute and run malicious software. Cyber attacks are becoming more and more every year. BALAJI is a certified ethical hacker in a security researcher in Comodo Security. He wrote an article about Distributive Malicious RTF Excel Sheets Document and Installing RAT using VBA Macro code.

218
 
Read More
2017-10-04

Extracting Malware from an Office Document

MalwareTech shared a video about how to easily extracting malware from an Office macro.

357
Latest Headlines
 
Read More
846
 
Read More
438
 
Read More
869

Trending Topics
digital forensics
computer forensics
Articles
mobile forensics
DFIR
Android forensics
digital forensics software
windows forensics
forensic data recovery
Top Stories
 
 
Right Now
 
bstrings 1.0 released
Top Five
Heat Index
 
1
Decrypting encrypted WhatsApp databases without the key
 
2
How to Make the Forensic Image of the Hard Drive
 
3
Extracting data from SmartSwitch backups
 
4
Forensic tools for your Mac
 
5
An Overview of Web Browser Forensics
`

Get Help Now

Thank you for contacting us.
Your Digital Investigator will call you shortly.