MENU

Posts Tagged ‘Cybersecurity’

Most Recent
 
Read More
2018-04-02

JTAGing as a way for extracting passwords

Mankind is trying to improve everyday objects in order to facilitate our life. Attacks on consumer smart devices can allow an attacker to gain constant access to the victim’s network. This type of attack can be prevented by disabling – or more effectively – removing the JTAG ports completely from production devices, thereby minimising its attack surface.

276
 
Read More
2018-03-31

Inside iCloud Drive

Special cloud storage iCloud Drive appeared with the release of the eighth version of iOS. iCloud Drive is a new technology for storing data in the “cloud” storage, which replaced the usual standard synchronization of user data with the iCloud account. With the “drive” prefix, the storage capabilities of Apple have significantly expanded.

196
 
Read More
2018-03-31

Detect Password Spraying With Logs Analysis

In recent years, the press has widely covered high-profile cases related to threats and incidents caused by malicious software. Attackers have become more inventive.

 

1379
 
Read More
2018-03-29

Analysis of Email Attachment Timestamps

Arman Gungor is a certified computer forensic examiner (CCE) and an e-Discovery expert with more than 21 years of experience in computer technology and technology. He is appointed as a neutral expert on computer expertise, as well as a neutral consultant on electronic discovery. In this blog, he talked about analyzing the timestamp for sending e-mail in Outlook.

405
Latest Headlines
Try a different filter
Trending Topics
Digital Forensics
Articles
Android
windows forensics
Incident Response
Cybersecurity
windows 10 forensics
News
Online Scam
Top Stories
Try a different filter
Right Now
Try a different filter
Top Five
Heat Index
 
1
Decrypting encrypted WhatsApp databases without the key
 
2
How to Make the Forensic Image of the Hard Drive
 
3
Extracting data from SmartSwitch backups
 
4
Forensic tools for your Mac
 
5
Android forensic analysis with Autopsy

Get Help Now

Thank you for contacting us.
Your Digital Investigator will call you shortly.