IoT Forensics: Security in an always connected world where things talk
Connected physical devices, home automation appliances, and wearable devices are all part of Internet of Things (IoT). All of these have two major things...
Multi-Factor Authentication System – Is it a Good Idea for an App?
With cyber-attacks on the rise, strong passwords no longer guarantee enough protection to keep your online profiles safe from hackers. In fact, other security...
Windows Drive Acquisition
In this article, by Oleg Skulkin and Scar de Courcier, authors of Windows Forensics Cookbook, we will cover drive acquisition in E01 format with FTK Imager, drive...
Working with Forensic Evidence Container Recipes
In this article by Preston Miller and Chapin Bryce, authors of Learning Python for Forensics, we introduce a recipe from our upcoming book, Python...
Digital and Mobile Forensics
In this article, Mattia Epifani and Pasquale Stirparo, co-authors of the book Learning iOS Forensics - Second Edition, would be talking mainly, if not...
Mobile Forensics
In this article by Soufiane Tahiri, the author of Mastering Mobile Forensics, we will look at the basics of smartphone forensics. Smartphone forensic is...
Incident Response and Live Analysis
In this article by Ayman Shaaban and Konstantin Sapronov, author of the book Practical Windows Forensics, describe the stages of preparation to respond to an...
What you need to know about VPNFilter Malware Attack
Have you heard about the latest VPNFilter Malware attack?
In brief, the software networking firm and its network analysis department known as ‘Talos’ identified a...
Analyzing Data Packets
In this article by Samir Datt, the author of the book Learning Network Forensics, you will learn to get your hands dirty by actually capturing and...
Evidence Acquisition and Analysis from iCloud
This article by Mattia Epifani and Pasquale Stirparo, the authors of the book, Learning iOS Forensics, introduces the cloud system provided by Apple to...