MENU

News
Most Recent
 
Read More
2017-11-18

Powerdown the PowerShell Attacks Overview

Kirtar Oz is involved in the analysis of PowerShell attacks among customers. He came up with several indicators that will help detect potential PowerShell attacks in the environment. These indicators are based on analysis and research.

 

182
 
Read More
2017-11-17

A Safe Haven for Malware

Steganography is a science that studies the ways of hidden transmission of information by hiding the very fact of transmission. Science is absolutely not new in its idea, but with the invention of digital ways of implementing algorithms used in it, its development has reached an essentially new level. Three different samples of malicious programs in network attacks containing tools for intellectual analysis of crypto-currency, hidden in forged image files were identified in 2017.

 

89
 
Read More
2017-11-15

MacOS Security Guide

Apple systems have proven themselves on the positive side. This is a reliable system, but if your private or corporate data is important to you, it is important to ensure maximum security for your Mac.

 

176
 
Read More
2017-11-12

Microsoft provides guidance on migrating DDE attacks

There are a lot of attacks which use fields Dynamic data exchange in the office. It has significantly increased recently. Microsoft still insists that the DDE is a functioning and will not treat it as a vulnerability.

 

82
Latest Headlines
Try a different filter
Trending Topics
Digital Forensics
Articles
Android
windows forensics
Incident Response
Cybersecurity
windows 10 forensics
News
Online Scam
Top Stories
Try a different filter
Right Now
Try a different filter
Top Five
Heat Index
 
1
Decrypting encrypted WhatsApp databases without the key
 
2
How to Make the Forensic Image of the Hard Drive
 
3
Extracting data from SmartSwitch backups
 
4
Forensic tools for your Mac
 
5
Android forensic analysis with Autopsy

Get Help Now

Thank you for contacting us.
Your Digital Investigator will call you shortly.