Trending
Heat Index
Latest Headlines
 
Read More
13
 
Read More
37
 
Read More
43

Trending Topics
digital forensics
mobile forensics
Articles
Android forensics
computer forensics
digital forensics software
DFIR
forensic data recovery
iOS forensics
The News
Most Recent
 
Read More
2017-01-24

A List of computer forensic courses, certifications and trainings

How much free computer forensics courses do you know? Do you know what Blackbag has a free forensic training?

 

13
 
Read More
2017-01-24

D3pak Kumar Glossary

D3pak Kumar shared his version of the Glossary. The glossary contains a lot of terms of computer forensics and email forensics.

 

3
 
Read More
2017-01-23

Top Quotes from “Mr. Robot”

Many are already familiar with the television series “Mr Robot”. The story of a young programmer Elliot suffering from antisocial personality disorder, a security engineer by day and by night a hacker. Thus, it appears quickly in a place where the interests of his employer – a company engaged in cyber security – and underground organizations that are trying to recruit him for the purpose of the collapse of the most powerful US corporations. In the television series set of lines that are of particular importance for the SOC managers.

 

13
 
Read More
2017-01-22

Threat Intelligence Best practices

The number of cyber-attacks is growing every day. Constantly there are new and complex threats, cybercriminals use clever tricks to bypass existing security technologies. For safety reasons it is not enough traditional solutions, such as antivirus, firewall and intrusion prevention system. Therefore resorted to Threat Intelligence System (TI) recently to protect the data.

 

18
 
Read More
2017-01-21

Windows Live Forensics

John Strand shared the video “Windows First Responder”.

 

38
 
Read More
2017-01-21

Basics of Windows Incident Response

Johnny Appleseed shared the article “Basics of Windows Incident Response”.

 

26
 
Read More
2017-01-21

Use a Fake virtual machine for stopping malware

Not so long ago was a post in which it is revealed that, some advanced malware can detect a virtual environment such as a sandbox to avoid detection and analysis. Due to the fact that, some threats can also detect monitoring tools used for malware analysis, these malware will not run to seem harmless. It was created a quick proof of concept (POC), to demonstrate the defensive tactics. Some malware use a mutex or registry key (a previous version of Locky).

 

15
Load More
End of the line!
Top Stories
 
 
Right Now
 
bstrings 1.0 released
News
 
A List of computer forensic courses, certifications and trainings
 
D3pak Kumar Glossary
 
Top Quotes from “Mr. Robot”
 
Use a Fake virtual machine for stopping malware
More
Articles
 
Threat Intelligence Best practices
 
Basics of Windows Incident Response
 
Is the Cloud Evil?
 
i2 Analyst’s Notebook Overview
More
Books
 
The book “Windows 10 Forensic Analysis”
 
Contemporary Digital Forensic Investigations of Cloud and Mobile Applications
 
Second Edition of Learning iOS Forensics is Announced
 
Crypto 101: introductory course on cryptography
More
How to
 
How to create hardware for brute force analysis
 
How to use recursive SQL queries to parse the “MicrosoftRegistrationDB.reg” files
 
Safe your mobile device from spyware
 
Safe private data of your Facebook account
More
Software
 
Steg Brute Force Tool V1.0 is available now
 
ExifTool Version 10.38 is available now
 
Autopsy (The Sleuth Kit) documentations were updated
 
Eric Zimmerman’s Tools were updated
More

Popular Now
 
 
 
 
 
The Latest
 
Read More
13
Editor's Picks
 
 
 
 
Go To
SORT
 
Threat Intelligence Best practices