Trending
Heat Index
Latest Headlines
 
Read More
34
 
Read More
40
 
Read More
23

Trending Topics
digital forensics
mobile forensics
Articles
Android forensics
computer forensics
digital forensics software
forensic data recovery
DFIR
iOS forensics
The News
Most Recent
 
Read More
2017-01-21

John Strand shared the video “Windows First Responder”.

 

 
Read More
2017-01-21

Basics of Windows Incident Response

Johnny Appleseed shared the article “Basics of Windows Incident Response”.

 

4
 
Read More
2017-01-21

Use a Fake virtual machine for stopping malware

Not so long ago was a post in which it is revealed that, some advanced malware can detect a virtual environment such as a sandbox to avoid detection and analysis. Due to the fact that, some threats can also detect monitoring tools used for malware analysis, these malware will not run to seem harmless. It was created a quick proof of concept (POC), to demonstrate the defensive tactics. Some malware use a mutex or registry key (a previous version of Locky).

 

2
 
Read More
2017-01-20

New Mac backdoor

Thomas Reed in his blog talks about the new Mac malware in 2017 year. He drew their attention to it, because it had not previously met. This malware program was extremely simplistic on the surface, consisting of only two files.

 

8
 
Read More
2017-01-19

Is the Cloud Evil?

John Pauling published a refutation of the article titled “Cloud is evil …”. In his post, he, regardless of point of view, considers each of the claims in this article, from his point of view and extensive experience DFIR with AWS (and to some extent Azure). He describes in detail his opinion and experience in claims, and you can view it here.

9
 
Read More
2017-01-18

i2 Analyst’s Notebook Overview

Many analysts often use the IBM i2 Analyst’s Notebook only for drawing beautiful pictures, such as organizational charts, although his capabilities allow much more. Consider a few methods:

 

26
 
Read More
2017-01-17

Is Vawtrak v2 the next major banking Trojan?

Neira Jones shared his article “Why Vawtrak v2 could be the next major banking Trojan”.

 

25
Load More
End of the line!
Top Stories
 
 
Right Now
 
bstrings 1.0 released
News
 
Use a Fake virtual machine for stopping malware
 
New Mac backdoor
 
Is Vawtrak v2 the next major banking Trojan?
 
Atola Disk Recycler v.2.5.2 is available now.
More
Articles
 
Basics of Windows Incident Response
 
Is the Cloud Evil?
 
i2 Analyst’s Notebook Overview
 
When the Mask Comes Off
More
Books
 
The book “Windows 10 Forensic Analysis”
 
Contemporary Digital Forensic Investigations of Cloud and Mobile Applications
 
Second Edition of Learning iOS Forensics is Announced
 
Crypto 101: introductory course on cryptography
More
How to
 
How to create hardware for brute force analysis
 
How to use recursive SQL queries to parse the “MicrosoftRegistrationDB.reg” files
 
Safe your mobile device from spyware
 
Safe private data of your Facebook account
More
Software
 
Steg Brute Force Tool V1.0 is available now
 
ExifTool Version 10.38 is available now
 
Autopsy (The Sleuth Kit) documentations were updated
 
Eric Zimmerman’s Tools were updated
More

Popular Now
 
 
 
 
 
The Latest
 
Read More
Editor's Picks
 
 
 
 
Go To
SORT
 
Basics of Windows Incident Response