Quantcast
Channel: Blog – eForensics
Browsing all 378 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Cybersecurity Career Guide: How to Land the Best Jobs | from University of...

Cybersecurity Career Guide: How to Land the Best Jobs Cybercrime can’t simply hurt businesses. It can destroy them. After a ransomware attack struck a medical office in Battle Creek, Michigan in April...

View Article


Android Forensics Challenge [FREE COURSE CONTENT]

In this course content blog we want to share an Android Forensics challenge - we are publishing evidence files from our Android Forensics course, along with some questions from Module 2 assignment in...

View Article


Image may be NSFW.
Clik here to view.

AirDrop Forensics | by Kinga Kięczkowska

AirDrop Forensics Welcome to AirDrop forensics! Let’s start with the basics: what is AirDrop? It’s a file-sharing service in macOS and iOS which uses both Bluetooth and WiFi to transfer files from one...

View Article

Image may be NSFW.
Clik here to view.

AirDrop Forensics 2 | by Kinga Kięczkowska

AirDrop Forensics 2 Welcome in AirDrop Round 2! After I published the AirDrop Forensics post my dear friend Mikey got in touch to let me know about other ways of obtaining AirDrop artefacts. Those are...

View Article

Image may be NSFW.
Clik here to view.

The Cyber Kill Chain explained – along with some 2020 examples | By Maciej...

The Cyber Kill Chain explained – along with some 2020 examples The Cyber Kill Chain framework is known to just about everybody who works hands on in the information security industry. I must admit,...

View Article


Image may be NSFW.
Clik here to view.

Storage Reserve blocks some tools from thoroughly wiping unallocated space |...

Storage Reserve blocks some tools from thoroughly wiping unallocated space Storage Reserve is a relatively new feature that keeps some disk space in a system volume available for downloading and...

View Article

Image may be NSFW.
Clik here to view.

Thunderbird Artifacts [FREE COURSE CONTENT]

In this excerpt from our Ubuntu Forensics course we will take a closer look at Thunderbird artifacts. Thunderbird is a popular email client, and all forensic investigators should know what information...

View Article

Image may be NSFW.
Clik here to view.

Debugging VisualBasic Malware | By Siddharth Sharma

Debugging VisualBasic Malware     Introduction Reversing malware written in Visual Basic has always been a challenge, or nightmare, as its functionality is totally different from other malware. Malware...

View Article


How to Strengthen Cybersecurity During/After COVID-19 | By Luke Smith

How to Strengthen Cybersecurity During/After COVID-19 The COVID-19 pandemic has spared no sector — its effects are even being seen in the cybersecurity industry. Through the pandemic, the usage of the...

View Article


Image may be NSFW.
Clik here to view.

Windows Process Internals : A few Concepts to know before jumping on Memory...

Windows Process Internals : A few Concepts to know before jumping on Memory Forensics I have been revising memory forensics lately and realized that there are very important concepts related to Windows...

View Article

Image may be NSFW.
Clik here to view.

Deepfakes: Genesis [FREE COURSE CONTENT]

In this text from our Digital Visual Media Anti–Forensics and Counter Anti–Forensics online course by Raahat Devender Singh we discover how deepfakes came to be, and where they're going. Deepfakes,...

View Article

Image may be NSFW.
Clik here to view.

New phishing campaign aimed at Bank of Ireland users | By Maciej Makowski

New phishing campaign aimed at Bank of Ireland users Update: It appears that all the websites examined below have now been taken down. The urlscan links are dead too. A new phishing campaign targeting...

View Article

Image may be NSFW.
Clik here to view.

Android Security Model, Infections and Detection Methods [FREE COURSE CONTENT]

In this short excerpt from our Android Malware Analysis course by Tom Sermpinis you can learn how the Android Security Model works, what are the common infection vectors, and their detection methods....

View Article


Image may be NSFW.
Clik here to view.

Black Energy 2 – Revisited (In-depth Memory Analysis) | By Kirtar Oza

Black Energy 2 – Revisited (In-depth Memory Analysis) Memory forensics is no different than any other investigation where “getting a first hit” is the most important thing. We may need to go through...

View Article

The COVID-19 Pandemic Is Already Taking a Toll on Cyber Security – This Is...

The COVID-19 Pandemic Is Already Taking a Toll on Cyber Security – This Is How CISOs Should Respond Find out How CISOS Should Prepare for the Pandemic Challenges! The coronavirus pandemic is affecting...

View Article


Image may be NSFW.
Clik here to view.

Extracting Passwords from Qihoo 360 Safe Browser and Tor Browser | By Oleg...

Extracting Passwords from Qihoo 360 Safe Browser and Tor Browser Tor Browser is a well-known tool for browsing the Web while renaming anonymous, while Qihoo 360 Safe Browser is one of China’s most...

View Article

Image may be NSFW.
Clik here to view.

Breaking LUKS Encryption | By Oleg Afonin

Breaking LUKS Encryption LUKS encryption is widely used in various Linux distributions to protect disks and create encrypted containers. Being a platform-independent, open-source specification, LUKS...

View Article


Image may be NSFW.
Clik here to view.

Windows Process Internals: A few Concepts to know before jumping on Memory...

Windows Process Internals: A few Concepts to know before jumping on Memory Forensics [Part 2] – ldrmodules  Ldrmodules is one of the trusted plugins of Volatility suit to detect a dll-hiding or...

View Article

Image may be NSFW.
Clik here to view.

The NSA’s advice on limiting location data exposure | By Maciej Makowski

The NSA’s advice on limiting location data exposure This week the US National Security Agency (NSA) published, rather ironically, a 3 page long document on the privacy risks posed by mobile devices....

View Article

Image may be NSFW.
Clik here to view.

Efficacy of detecting "abnormal" is as good as your capability to detect...

Efficacy of detecting "abnormal" is as good as your capability to detect "Normal" The post Efficacy of detecting "abnormal" is as good as your capability to detect "Normal" | By Kirtar Oza appeared...

View Article
Browsing all 378 articles
Browse latest View live