Trending
Heat Index
Latest Headlines
 
Read More
29
 
Read More
35
 
Read More
21

Trending Topics
digital forensics
mobile forensics
Articles
Android forensics
computer forensics
digital forensics software
forensic data recovery
DFIR
iOS forensics
The News
Most Recent
 
Read More
2017-01-15

The book “Windows 10 Forensic Analysis”

Bachelor of Science Honours Project  published the book “Windows 10 Forensic Analysis”. The author is Rhys P Evans. Rhys P Evans works at Birmingham City University.

 

29
 
Read More
2017-01-15

5 tips for navigating social media

The whole world is permeated with the Internet, thanks to social networks such as Facebook, Twitter, Instagram, Snapchat, and LinkedIn, we can communicate with people from his childhood, past or with new acquaintances, who are thousands of miles away from us. You must understand that every tweet, status update, and photos can be used against you. Now we look at 5 tips to navigate social media during a divorce:

  1. Before you upload photos or write a post, always think what it can mean for you; 2. Monitoring of privacy settings; 3. Never use the word in his correspondence “said my attorney.” 4. The most effective way, so that no one spoke and did not follow [...]

5
 
Read More
2017-01-14

Get complete control of a PC using a USB 3.0 port

Kevin Parris shared the article “Hackers could gain complete control of an Intel-based PC using a USB 3.0 port”.

 

38
 
Read More
2017-01-14

When the Mask Comes Off

Video recording and photos are technologies that have been widely used for a long time. Many programs help users to make a real movie out of their own video recordings. Most users just delete unwanted frames, combine several video clips in one and add titles, but modern programs have a wide range of functions.

 

Nowadays, a compositing is a technology that is used not only by movie production companies, but also by average users and even without the compositing one can change a video in a way that it will be impossible to see what has been recorded.

 

11
 
Read More
2017-01-14

Forensic analysis techniques for digital imaging

At last month’s Congresses Computer security researchers presented their work in the different areas of security. During the participation of José Miguel Gálvez provided Balthazar study entitled ‘The identification primary source digital image. ”

 

17
 
Read More
2017-01-14

How to create hardware for brute force analysis

Netmux shared the step by step manual How to create hardware for brute force. The budget is 5000$.

 

19
 
Read More
2017-01-13

WINDOWS 10 JUMP LIST FORENSICS

BlackBag shared good article about JumpList Forensics.

 

19
Load More
End of the line!
Top Stories
 
 
Right Now
 
bstrings 1.0 released
News
 
5 tips for navigating social media
 
DFIR Forms and Examples
 
The Top Information Security Conferences of 2017
 
SANS Holiday Hack Challenge 2016
More
Articles
 
When the Mask Comes Off
 
Forensic analysis techniques for digital imaging
 
WINDOWS 10 JUMP LIST FORENSICS
 
Alexandre Borges’ presentations
More
Books
 
The book “Windows 10 Forensic Analysis”
 
Contemporary Digital Forensic Investigations of Cloud and Mobile Applications
 
Second Edition of Learning iOS Forensics is Announced
 
Crypto 101: introductory course on cryptography
More
How to
 
How to create hardware for brute force analysis
 
How to use recursive SQL queries to parse the “MicrosoftRegistrationDB.reg” files
 
Safe your mobile device from spyware
 
Safe private data of your Facebook account
More
Software
 
Steg Brute Force Tool V1.0 is available now
 
ExifTool Version 10.38 is available now
 
Autopsy (The Sleuth Kit) documentations were updated
 
Eric Zimmerman’s Tools were updated
More

Popular Now
 
 
 
 
 
The Latest
 
Read More
29
Editor's Picks
 
 
 
 
Go To
SORT
 
When the Mask Comes Off