MENU

Posts Tagged ‘Incident Response’

Most Recent
 
Read More
2018-12-23

History of cryptocurrency incidents

Cryptocurrency is conquering the world rapidly. It is considered that the main distinctive features of cryptocurrency are decentralization, anonymity and security. However, deception, fraud, extortion and hacking are only some of the methods that can be used to steal  your cryptocurrency.

94
 
Read More
2018-12-18

Cybersecurity: Five mistakes that help hackers, compromise companies

At the end of the year, it is customary to sum up, so today we will tell you about the mistakes that companies make when countering cyber threats. Our report describes the five most common errors encountered by our forensic specialists this year when investigating cyber incidents.

194
 
Read More
2018-12-16

How to protect your smartphone from malware

Malware authors are constantly inventing new tricks, testing the Android users’ vigilance.

947
 
Read More
2018-12-09

Cyber Threats: Social Networks

Last autumn, a private database appeared on the internet. Hacken’s specialists did not identify the source of the leak, but after conducting an audit of unprotected storage facilities, they assumed that the bases were compromised by a Canadian company. The company has not commented.

89
Latest Headlines
Try a different filter
Trending Topics
Digital Forensics
Articles
Android
windows forensics
Incident Response
Cybersecurity
windows 10 forensics
News
Online Scam
Top Stories
Try a different filter
Right Now
Try a different filter
Top Five
Heat Index
 
1
Decrypting encrypted WhatsApp databases without the key
 
2
How to Make the Forensic Image of the Hard Drive
 
3
Extracting data from SmartSwitch backups
 
4
Forensic tools for your Mac
 
5
Android forensic analysis with Autopsy

Get Help Now

Thank you for contacting us.
Your Digital Investigator will call you shortly.