MENU

Posts Tagged ‘Cybersecurity’

Most Recent
 
Read More
2018-03-16

Software for unlocking locked iPhones

The iPhone usually contains all confidential information. This information is valuable on the black market and can be used to steal your identity. Everyone remembers the case between Apple and the FBI.

990
 
Read More
2018-03-15

Malware in a router

A powerful malicious code has been detected that can monitor and download everything that happens on the computer, even without being installed on the target device itself. Instead, it is in the router.

171
 
Read More
2018-03-15

CorelDRAW Forensics: step by step

CorelDRAW is the best graphics editor, which is developed by a Canadian company Corel Corporation. This graphics editor has great functionality. Criminals can use it for illegal activities, such as fraud, money counterfeiting, etc. Today, we will describe how to detect CoralDRAW artefacts when examining a computer. We will use AXIOM by Magnet Forensics as a tool for analysis, which is one of the best tools for computer forensics.

662
 
Read More
2018-03-15

Types of USB Attacks

USB was developed without taking into account the security of users. Windows, Linux and macOS trust any connected USB port. If the hacker has physical access to your computer, in this case the attack vector using USB becomes very dangerous.

374
Latest Headlines
Try a different filter
Trending Topics
Digital Forensics
Articles
Android
windows forensics
Incident Response
Cybersecurity
windows 10 forensics
News
Online Scam
Top Stories
Try a different filter
Right Now
Try a different filter
Top Five
Heat Index
 
1
Decrypting encrypted WhatsApp databases without the key
 
2
How to Make the Forensic Image of the Hard Drive
 
3
Extracting data from SmartSwitch backups
 
4
Forensic tools for your Mac
 
5
Android forensic analysis with Autopsy

Get Help Now

Thank you for contacting us.
Your Digital Investigator will call you shortly.