MENU

Articles

Most Recent
 
Read More
2018-09-05

MagiCube complex is used to extract data from smartphones

Modern companies develop products designed to protect the personal data of their customers. Criminals use these producst because they are confident in the security of the transmitted data. There are only a few companies that develop their own hardware and software products for digital research and information security protection. Meiya Pico is such a company.

939
 
Read More
2018-08-29

Fighting Cyber Harassment and Online Extortion

Are you being harassed or blackmailed online? We can help you fight back.

Individuals, small businesses and large corporations are open to all sorts of online attacks:

People set up fake social media or email accounts, pretending to be you, to spread lies or doctored photos and videos in order to embarrass you, spoil your reputation or hurt your business. Someone pretends to be a friend to prompt you to share private, personal information or photos, then threatens to share them with the world unless you pay a ransom. Someone harasses you online so much you block them, only to see them create a new account and resume the harassment all over again.

In such cases, the [...]

170
 
Read More
2018-08-21

Popular Cryptocurrency Miners

Bitcoin is the most famous cryptocurrency, and the oldest one. Previously, it could be mined using a home computer. It was even possible to use your laptop. Then the situation shifted to the use of GPUs as the complexity of cryptocurrency mining increased. At present, you need specialized intelligent equipment.

109
 
Read More
2018-07-19

An Overview of Web Browser Forensics

Browser Forensics Analysis is a separate, large area of ​​expertise.

 

Web browsers are used in mobile devices, tablets, netbooks, desktops, etc., and often can be used not just for web surfing, but for navigation through the file system of the device. The web browser’s cache can contain downloaded images, videos, documents, executable files and scripts. Web browsers also can contain data entered into forms: search queries, logins and passwords for web email accounts, social networks, other web sites and financial information (for example, credit card numbers). Favorites and searches can give the researcher an idea of ​​the device owner’s interests.

14917
Latest Headlines
Try a different filter
Trending Topics
Digital Forensics
Articles
Android
windows forensics
Incident Response
Cybersecurity
windows 10 forensics
News
Online Scam
Top Stories
Try a different filter
Right Now
Try a different filter
Top Five
Heat Index
 
1
Decrypting encrypted WhatsApp databases without the key
 
2
How to Make the Forensic Image of the Hard Drive
 
3
Extracting data from SmartSwitch backups
 
4
Forensic tools for your Mac
 
5
Android forensic analysis with Autopsy

Get Help Now

Thank you for contacting us.
Your Digital Investigator will call you shortly.