MENU

News
Most Recent
 
Read More
2018-03-31

Inside iCloud Drive

Special cloud storage iCloud Drive appeared with the release of the eighth version of iOS. iCloud Drive is a new technology for storing data in the “cloud” storage, which replaced the usual standard synchronization of user data with the iCloud account. With the “drive” prefix, the storage capabilities of Apple have significantly expanded.

196
 
Read More
2018-03-31

Detect Password Spraying With Logs Analysis

In recent years, the press has widely covered high-profile cases related to threats and incidents caused by malicious software. Attackers have become more inventive.

 

1379
 
Read More
2018-03-29

Analysis of Email Attachment Timestamps

Arman Gungor is a certified computer forensic examiner (CCE) and an e-Discovery expert with more than 21 years of experience in computer technology and technology. He is appointed as a neutral expert on computer expertise, as well as a neutral consultant on electronic discovery. In this blog, he talked about analyzing the timestamp for sending e-mail in Outlook.

405
 
Read More
2018-03-28

Obfuscation and Detection Techniques

Attackers are constantly improving and therefore are looking for new attacks, using evasion techniques to maintain the effectiveness of old vectors in the ever-changing protective landscape. Many of these threat participants use the obfuscation framework for common scripting languages, such as JavaScript and PowerShell, to prevent signature-based detection of conventional offensive tradecraft written in these languages. Some hidden intruders have translated their tradecraft into languages ​​that do not support this additional visibility.

395
Latest Headlines
Try a different filter
Trending Topics
Digital Forensics
Articles
Android
windows forensics
Incident Response
Cybersecurity
windows 10 forensics
News
Online Scam
Top Stories
Try a different filter
Right Now
Try a different filter
Top Five
Heat Index
 
1
Decrypting encrypted WhatsApp databases without the key
 
2
How to Make the Forensic Image of the Hard Drive
 
3
Extracting data from SmartSwitch backups
 
4
Forensic tools for your Mac
 
5
Android forensic analysis with Autopsy

Get Help Now

Thank you for contacting us.
Your Digital Investigator will call you shortly.