MENU

News
Most Recent
 
Read More
2018-06-13

Is your child being cyberbullied? Know the signs, and learn what you can do

We’ve all heard the horror stories about cyberbullying. Online bullies, often acting anonymously, pick a target and never let up. They harass, they make threats, they spread rumors on social media.

They make their targets feel rejected, isolated, excluded. It can lead to despair, depression and anxiety, which sometimes can contribute to suicidal behavior.

It is hell to deal with, and too many families know this pain all too well. Many families find themselves wondering how to avoid cyberbullying.

 

https://www.digitalforensics.com/blog/wp-content/uploads/2018/06/00048.mp4

 

How common is cyberbullying in the United States? Here are some [...]

125
 
Read More
2018-06-12

Flash drive-sniffing dogs, warnings for retailers and burgers that may have cost you way too much

Do you keep up with the latest cyber security news? Here are a few interesting recent items you may have missed:

‣ Police dogs are being trained to sniff out flash drives, destroyed computers and other electronic devices to help prosecute child pornographers.

Only one out of every 50 dogs tested is able to become an Electronic Storage Detection, or ESD, dog, Kerry Halligan, a K-9 instructor for the Connecticut State Police, told CNET Magazine. It is much more difficult for a dog to learn to detect the telltale chemical in electronics than to sniff out narcotics, bombs or people, she said. Labrador retrievers seem to be best suited to the task. Read more here.

‣ [...]

138
 
Read More
2018-04-02

Bypassing AppLocker with PowerShell Scripts

Several years ago, Microsoft announced a new tool – AppLocker, which, according to the developers, was designed to increase the level of security when working in Windows. Unfortunately, the way was uncovered, in which you can run any application in the system bypassing AppLocker and without administrator rights.

356
 
Read More
2018-04-02

JTAGing as a way for extracting passwords

Mankind is trying to improve everyday objects in order to facilitate our life. Attacks on consumer smart devices can allow an attacker to gain constant access to the victim’s network. This type of attack can be prevented by disabling – or more effectively – removing the JTAG ports completely from production devices, thereby minimising its attack surface.

275
Latest Headlines
Try a different filter
Trending Topics
Digital Forensics
Articles
Android
windows forensics
Incident Response
Cybersecurity
windows 10 forensics
News
Online Scam
Top Stories
Try a different filter
Right Now
Try a different filter
Top Five
Heat Index
 
1
Decrypting encrypted WhatsApp databases without the key
 
2
How to Make the Forensic Image of the Hard Drive
 
3
Extracting data from SmartSwitch backups
 
4
Forensic tools for your Mac
 
5
Android forensic analysis with Autopsy

Get Help Now

Thank you for contacting us.
Your Digital Investigator will call you shortly.