Trending
Heat Index
Latest Headlines
 
Read More
115
 
Read More
38
 
Read More
31

Trending Topics
digital forensics
mobile forensics
Articles
computer forensics
Android forensics
digital forensics software
DFIR
iOS forensics
forensic data recovery
The News
Most Recent
 
Read More
2017-04-25

Who is the owner of the mobile device?

Privacy is the basis of democracy. Therefore, sometimes support forensic software developers gets requests like this:

‘We need Software to identify the owner of smartphone & tablets regarding to the data on the phone to avoid deception. We are working for insurances that send us phones from customers who would like to recover their data. We would like to avoid with your software the customer who sends us the phone of someone else. If you have any ideas how I can do this.’

 

This article will tell how to identify the owner of a mobile device.

 

Who is the owner of the iOS device?

Before you know who the owner of the iPhone you [...]

35
 
Read More
2017-04-18

“Hello. Team of TeamViewer is calling you… “. An anthology of the attack.

The systems of protecting computers and networks are becoming more perfect every day. It’s harder for hackers to find a way to access data on someone else’s computer. A man remains the weakest link in cyber security. Not without reason 95 attacks on computer systems and networks begin with phishing ones. An example of such an attack observed in the last few months is mass mailings of infected Office documents. Thus, hackers try to intercept control on Windows and MacOS computers.

 

 

40
 
Read More
2017-04-12

Acquisition and Forensic Analysis of Apple Devices

Mobile devices of Apple such as iPhones and iPads are 15% of the mobile market. Therefore, it is often on research in forensic laboratories.

 

107
 
Read More
2017-04-04

How to Make the Forensic Image of the Hard Drive

Digital devices are an integral part of our lives. Therefore, digital evidence, namely, evidence obtained from various digital devices, is increasingly used in investigations in the corporation or law enforcement.

 

221
 
Read More
2017-04-01

Understanding Mac OS full disk encryption

Filippo Valsorda published an article on how to install and un-encrypt hard drives on Macs.

 

71
 
Read More
2017-03-31

Ransomware Timeline

David Balaban shared the ransomware timeline for the period from May 2016 to March 2017.

49
 
Read More
2017-03-31

WINFE looking for Beta Testers

WinFE’s developer looking for beta testers for his new release of WinFE.

 

19
Load More
End of the line!
Top Stories
 
 
Right Now
 
bstrings 1.0 released
News
 
Ransomware Timeline
 
WINFE looking for Beta Testers
 
Capture VNC Session of Remote PC
 
Reverse Engineering Malware Material
More
Articles
 
Who is the owner of the mobile device?
 
“Hello. Team of TeamViewer is calling you… “. An anthology of the attack.
 
Acquisition and Forensic Analysis of Apple Devices
 
How to Make the Forensic Image of the Hard Drive
More
Books
 
Advanced Threat Analytics Playbook
 
Intelligence – Driven Incident Response
 
The book “Windows 10 Forensic Analysis”
 
Contemporary Digital Forensic Investigations of Cloud and Mobile Applications
More
How to
 
Understanding Mac OS full disk encryption
 
How to protect your Apple iCloud account
 
How to Recover BitLocker Keys
 
How to create hardware for brute force analysis
More
Software
 
SQLite Forensics with Visual NAND Reconstructor
 
Hiberfil.sys Analysis with Hibernation Recon
 
EXIFTOOL VERSION 10.45 IS AVAILABLE NOW
 
Oxygen Forensic Detective v. 9.2 has released
More

Popular Now
 
 
 
 
 
The Latest
 
Read More
35
Editor's Picks
 
 
 
 
Go To
SORT
 
Who is the owner of the mobile device?