Network Evidence Collection
In this article by Gerard Johansen, author of the book Digital Forensics and Incident Response, explains that the traditional focus of digital forensics has...
Windows Drive Acquisition
In this article, by Oleg Skulkin and Scar de Courcier, authors of Windows Forensics Cookbook, we will cover drive acquisition in E01 format with FTK Imager, drive...
Working with Forensic Evidence Container Recipes
In this article by Preston Miller and Chapin Bryce, authors of Learning Python for Forensics, we introduce a recipe from our upcoming book, Python...
IoT Forensics: Security in an always connected world where things talk
Connected physical devices, home automation appliances, and wearable devices are all part of Internet of Things (IoT). All of these have two major things...
What is Digital Forensics?
Who here hasn’t watched the American TV show, Mr. Robot? For the uninitiated, Mr. Robot is a digital crime thriller that features the protagonist...
Getting started with Digital forensics using Autopsy
Digital forensics involves the preservation, acquisition, documentation, analysis, and interpretation of evidence from various storage media types. It is not only limited to laptops,...
What you need to know about VPNFilter Malware Attack
Have you heard about the latest VPNFilter Malware attack?
In brief, the software networking firm and its network analysis department known as ‘Talos’ identified a...
Multi-Factor Authentication System – Is it a Good Idea for an App?
With cyber-attacks on the rise, strong passwords no longer guarantee enough protection to keep your online profiles safe from hackers. In fact, other security...
SENSORID attack: Calibration fingerprinting that can easily trace your iOS and Android phones, study...
A new study by researchers at Cambridge University’s Computer Laboratory has revealed that an attack called calibration fingerprinting or SENSORID, allows iOS and Android...