Posts Tagged ‘Social media forensics’

Most Recent
 
Read More
2018-12-09

Cyber Threats: Social Networks

Last autumn, a private database appeared on the internet. Hacken’s specialists did not identify the source of the leak, but after conducting an audit of unprotected storage facilities, they assumed that the bases were compromised by a Canadian company. The company has not commented.

83
 
Read More
2017-12-29

How to use Wayback Machine

There is a very interesting and useful project – a web archive on the Internet – Internet archive Wayback Machine. An organization called the Internet Archive, which was established in 1996 in San Francisco. The archive of the Internet pages is designed to preserve, familiarize and study the information available for all these years in the worldwide network.

229
 
Read More
2017-08-04

The basic of social engineering

George V. Hulme and Joan Goodchild collected in one article the foundations of social engineering. Social engineering is essentially the art of gaining access to buildings, systems or data by exploiting human psychology, rather than by breaking in or using technical hacking techniques. Famous hacker Kevin Mitnick helped popularize the term ‘social engineering’ in the ’90s, although the idea and many of the techniques have been around as long as there have been scam artists of any sort.

303
 
Read More
2017-02-09

Evidences from Social Media

John Patzakis’s blog talks about criminal matters disclosed through social media. Search for legal changes in the field of social media has given indications of more than 2000 results for this topic. John is a brief overview of the five known cases of the investigation. In these examples of criminal cases described in the evidence search methods in social networks.

 

168
Latest Headlines
 
Read More
722
 
Read More
393
 
Read More
774

Trending Topics
digital forensics
computer forensics
Articles
mobile forensics
DFIR
digital forensics software
Android forensics
windows forensics
incident response
Top Stories
 
 
Right Now
 
bstrings 1.0 released
Top Five
Heat Index
 
1
Decrypting encrypted WhatsApp databases without the key
 
2
How to Make the Forensic Image of the Hard Drive
 
3
Extracting data from SmartSwitch backups
 
4
Forensic tools for your Mac
 
5
An Overview of Web Browser Forensics