MENU

News
Most Recent
 
Read More
2018-11-23

A complex form of mobile phone fraud you should know about

One of the most popular types of crime is fraud with smartphones. Smartphones store a lot of personal information, from photos to money. Only attentiveness and sanity of citizens can help to prevent fraud. Anybody can become a victim of fraudsters: businessmen, public officials, show business stars and ordinary citizens.

126
 
Read More
2018-11-04

Strengths and vulnerabilities in WhatsApp

Time is very valuable in the modern world. A person can satisfy most needs in one click. More and more, new applications for shopping, communication, taxi, leisure and many other services are being invented.

 

233
 
Read More
2018-10-25

GPlayed Is A Dangerous New Virus

Cybersecurity experts from the Cisco Talos group discovered a new dangerous virus, which is called GPlayed. The malware is still at the testing stage, but it can turn into a serious threat.

123
 
Read More
2018-10-23

Understanding GreyEnergy Programs

Every year, cyber attacks become more specialized. In 2015 a series of attacks on the Ukrainian power system was made. During these large-scale attacks, ESET researchers began to detect another family of malicious programs, called GreyEnergy.

79
Latest Headlines
Try a different filter
Trending Topics
Digital Forensics
Articles
Android
windows forensics
Incident Response
Cybersecurity
windows 10 forensics
News
Online Scam
Top Stories
Try a different filter
Right Now
Try a different filter
Top Five
Heat Index
 
1
Decrypting encrypted WhatsApp databases without the key
 
2
How to Make the Forensic Image of the Hard Drive
 
3
Extracting data from SmartSwitch backups
 
4
Forensic tools for your Mac
 
5
Android forensic analysis with Autopsy

Get Help Now

Thank you for contacting us.
Your Digital Investigator will call you shortly.