Trending
Heat Index
Latest Headlines
 
Read More
39
 
Read More
27
 
Read More
17

Trending Topics
digital forensics
mobile forensics
Articles
Android forensics
computer forensics
digital forensics software
DFIR
iOS forensics
forensic data recovery
The News
Most Recent
 
Read More
2017-03-23

Linux and Unix Forensics with Hal Pomeranz

Hal Pomeranz has huge experience in Computer forensics. In the webcast he tells us about Linux and Unix forensics.

 

5
 
Read More
2017-03-23

Understanding Threats Through Red

SANS Pen Test Training shared the video ‘SANS Webcast: Breaking Red – Understanding Threats through Red’. The video helps us understand about SANS SEC564 course.

 

1
 
Read More
2017-03-22

Mac Systems Malware Defence

All tense debate whether Mac computers are more secure than Windows computers. Bill Brenner decided to look into this matter. Bill leads a look at Mac malware and give some advice to ensure the best protection.

 

4
 
Read More
2017-03-20

Bypass User Account Control in Windows 10

A new method that allows you to track applications to control access to accounts (UAC) in Windows 10, described in detail security security by Matt Nelson.

 

18
 
Read More
2017-03-19

A Sample of Smartphone Forensic Analysis

Here in the video about a sample of smartphone forensic analysis. Digital forensic detective Nick Herfordt explains how he uncovered critical evidence from the  phone.

 

39
 
Read More
2017-03-19

Threat Hunting Techniques

A lot of information on the subject of threatening hunting and Alan Kahn did not stay aloof. In his post he refreshes in memory several common methods of hunting.

 

9
 
Read More
2017-03-18

Windows 10 RAM Forensics and UEFI Attacks

Look around your home and most likely, you have at least several devices using Universal Serial Bus. On average, about 3 billion USB ports are delivered every year, making it the most successful type of peripheral connection in the world.

 

49
Load More
End of the line!
Top Stories
 
 
Right Now
 
bstrings 1.0 released
News
 
Mac Systems Malware Defence
 
Threat Hunting Techniques
 
Windows 10 RAM Forensics and UEFI Attacks
 
Reverse Engineering Samsung SBOOT
More
Articles
 
Bypass User Account Control in Windows 10
 
Thermal Attacks on Mobile-based User Authentication
 
Microsoft Office Document Metadata in Incident Response
 
Detecting Android Malware
More
Books
 
Intelligence – Driven Incident Response
 
The book “Windows 10 Forensic Analysis”
 
Contemporary Digital Forensic Investigations of Cloud and Mobile Applications
 
Second Edition of Learning iOS Forensics is Announced
More
How to
 
How to Recover BitLocker Keys
 
How to create hardware for brute force analysis
 
How to use recursive SQL queries to parse the “MicrosoftRegistrationDB.reg” files
 
Safe your mobile device from spyware
More
Software
 
Hiberfil.sys Analysis with Hibernation Recon
 
EXIFTOOL VERSION 10.45 IS AVAILABLE NOW
 
Oxygen Forensic Detective v. 9.2 has released
 
A Tool to Build Malware Analysis Virtual Machines
More

Popular Now
 
 
 
 
 
The Latest
 
Read More
5
Editor's Picks
 
 
 
 
Go To
SORT
 
Bypass User Account Control in Windows 10