MENU

News
Most Recent
 
Read More
2018-03-19

Word Documents with Macros Forensic Analysis

Attacks in memory are growing and attracting increasing attention. The consumer deceives the inclusion of macros in a Microsoft Office Word document that is delivered by email. Users will receive several email options, regardless of whether it has a built-in link or attachment.

720
 
Read More
2018-03-18

How to make a computer forensic image forensically bootable

This article provides a guide to virtualizing your trial or test disk image file in Windows without converting it directly using VirtualBox.

270
 
Read More
2018-03-18

Plans are good — but practice is everything

Lately many cyber attacks have taken place and not only. Many companies have thought about their safety. A new report from the IBM Business Value Institute (IBV) highlights the importance of conducting a crisis response simulation for senior management.

62
 
Read More
2018-03-16

Software for unlocking locked iPhones

The iPhone usually contains all confidential information. This information is valuable on the black market and can be used to steal your identity. Everyone remembers the case between Apple and the FBI.

990
Latest Headlines
Try a different filter
Trending Topics
Digital Forensics
Articles
Android
windows forensics
Incident Response
Cybersecurity
windows 10 forensics
News
Online Scam
Top Stories
Try a different filter
Right Now
Try a different filter
Top Five
Heat Index
 
1
Decrypting encrypted WhatsApp databases without the key
 
2
How to Make the Forensic Image of the Hard Drive
 
3
Extracting data from SmartSwitch backups
 
4
Forensic tools for your Mac
 
5
Android forensic analysis with Autopsy

Get Help Now

Thank you for contacting us.
Your Digital Investigator will call you shortly.