MENU

Posts Tagged ‘Cybersecurity’

Most Recent
 
Read More
2018-01-28

iOS 11.3 Overview

Apple iOS is the most secure mobile OS. Apple officially introduced a new version of the operating system for mobile devices iOS 11.3, which will be available in the coming spring.

161
 
Read More
2018-01-26

Meterpreter loader generator

This article is dedicated to a somewhat unusual instrument. SpookFlare is the loader generator for the Meterpreter Reverse HTTP and HTTPS stages. It swaps a custom encrypter with the functions of obfuscating strings and compiling the code at runtime. The peculiarity of SpookFlare is to bypass all existing AV at the moment. Due to the properties, the relevance of the tool is ambitiously aimed at a long period of time.

116
 
Read More
2018-01-25

How to wipe a hard drive

If you decide to change your old hard drive to a more modern one and give it to a friend, or you sell it, then you should be sure of a hundred percent removal of information from it. There are thefts of important sensitive information from discarded disks.

1511
 
Read More
2018-01-21

How to debug the third-party Android Java code

This article describes how to debug the third-party Android Java code on Windows, taking into account the specifics of OS X. There is a very detailed article from @ CR0SP that will help you understand the material.

101
Latest Headlines
Try a different filter
Trending Topics
Digital Forensics
Articles
Android
windows forensics
Incident Response
Cybersecurity
windows 10 forensics
News
Online Scam
Top Stories
Try a different filter
Right Now
Try a different filter
Top Five
Heat Index
 
1
Decrypting encrypted WhatsApp databases without the key
 
2
How to Make the Forensic Image of the Hard Drive
 
3
Extracting data from SmartSwitch backups
 
4
Forensic tools for your Mac
 
5
Android forensic analysis with Autopsy

Get Help Now

Thank you for contacting us.
Your Digital Investigator will call you shortly.