Forensics

In an always connected world where things talk, we know it’s important to stay up-to-date with security. Packt Hub provides the latest insights and news around developments in digital forensics.

Network Evidence Collection

0
In this article by Gerard Johansen, author of the book Digital Forensics and Incident Response, explains that the traditional focus of digital forensics has...

Windows Drive Acquisition

0
In this article, by Oleg Skulkin and Scar de Courcier, authors of Windows Forensics Cookbook, we  will cover drive acquisition in E01 format with FTK Imager, drive...

Working with Forensic Evidence Container Recipes

0
In this article by Preston Miller and Chapin Bryce, authors of Learning Python for Forensics, we introduce a recipe from our upcoming book, Python...
IoT Security

IoT Forensics: Security in an always connected world where things talk

0
Connected physical devices, home automation appliances, and wearable devices are all part of Internet of Things (IoT). All of these have two major things...
Top 5 cybersecurity assessment tools for networking professionals

What is Digital Forensics?

0
Who here hasn’t watched the American TV show, Mr. Robot? For the uninitiated, Mr. Robot is a digital crime thriller that features the protagonist...
digital forensics

Getting started with Digital forensics using Autopsy

0
Digital forensics involves the preservation, acquisition, documentation, analysis, and interpretation of evidence from various storage media types. It is not only limited to laptops,...

What you need to know about VPNFilter Malware Attack

0
Have you heard about the latest VPNFilter Malware attack? In brief, the software networking firm and its network analysis department known as ‘Talos’ identified a...

Multi-Factor Authentication System – Is it a Good Idea for an App?

0
With cyber-attacks on the rise, strong passwords no longer guarantee enough protection to keep your online profiles safe from hackers. In fact, other security...
biometric fingerprint

SENSORID attack: Calibration fingerprinting that can easily trace your iOS and Android phones, study...

0
A new study by researchers at Cambridge University’s Computer Laboratory has revealed that an attack called calibration fingerprinting or SENSORID, allows iOS and Android...

Must Read in Security

Top 6 Cybersecurity Books from Packt to Accelerate Your Career

0
With new technology threats, rising international tensions, and state-sponsored cyber-attacks, cybersecurity is more important than ever. In organizations worldwide, there is not only a dire need for cybersecurity...

Win-KeX Version 2.0 from Kali Linux

Interviews