Get ready for Practical Social Engineering course (Part 1.1) –“NLH in the...
In preparation for our upcoming Practical Social Engineering course we have decided to share with you articles, materials and essays on the topic of social engineering that our publishing company has...
View ArticleDigital Forensics Hall of Fame, Episode 2: The Death of Sharon Lopatka
Welcome to the Digital Forensics Hall of Fame, where we talk about the most famous cases in history solved by digital forensics. The second episode will tell us the story of Sharon Lopatka, whose...
View ArticleELA Photo Forensics
By: Pierluigi Paganini from Infosec Institute Error Level Analysis is a forensic method to identify portions of an image with a different level of compression. The technique could be used to determine...
View ArticleGet ready for Practical Social Engineering course (Part 1.2) –“NLH in the...
In preparation for our upcoming Practical Social Engineering course we have decided to share with you articles, materials and essays on the topic of social engineering that our publishing company has...
View Article101 Best Forensics Tutorials E-Book is now available!
We have decided to publish our “101 Best Forensics Tutorials” issue as an e-book, for everyone to buy and download! If you are our subscriber, you have probably already downloaded this issue, if not –...
View ArticleRDS1025 Wave Rambler USB Pen PC Oscilloscope from Sain Smart
Reviewed by Bob Monroe 2 June 2015 There is an old business motto that says “If you can’t measure it, you can’t manage it.” Of course this is baloney because intangibles like your reputation, trust,...
View Article“Incredibly exciting time for the security industry”– Interview with David...
Barricade is an innovative security company based in Ireland. Their solutions work based on machine learning and artificial intelligence, in a successfull attempt to democratize and simplify security....
View ArticleAutomation is crucial for reducing costs and operational overhead – interview...
[eForensics Magazine]: Having too much data to sift through is becoming one of the biggest problems for SOCs around the world. How do your new tools help with solving it? [Matan Kubovsky]: In today’s...
View ArticleBecome a Cyber Security Expert: Get Training & Certifications for CISA, CISM,...
|| by Priya Jatoliya Surprising though it might be, you must already have realized by now that any computer with an internet connection is subject to risks of virus attacks. There are other malware and...
View ArticleIT Certification and Career Guide | Infographic by TrainACE
IT Certification And Career Guide from TrainACE The post IT Certification and Career Guide | Infographic by TrainACE appeared first on eForensics.
View ArticleTop Reasons Why Your Business Needs to Archive Text Messages | Infographic...
Source >> The post Top Reasons Why Your Business Needs to Archive Text Messages | Infographic from TeleMessage appeared first on eForensics.
View ArticleCloud Computing Is Changing The Security Space – Here’s What You Need To Know
by Tim Mullahy, Liberty Center One In 2016, 14 million small businesses were hacked. It’s a statistic that speaks to a disturbing trend in the digital underworld – criminals have realized how much...
View ArticleThe Heathrow Breach Is Something That Could Happen To Any Of Us – How You Can...
by Max Emelianov, HostForWeb You’ve doubtless heard the news by now. An unemployed man. A USB drive. Critical security data. This sort of thing could easily happen to you, too. Plenty of folks...
View ArticleWill 2018 Be The Year We Say Goodbye To Passwords?
by Matthew Davis, Future Hosting People are bad at using passwords. They create passwords that can be guessed in fractions of a second by modern password cracking systems. They use the same passwords...
View ArticleWhy Machine Learning is More Likely to Cure Cancer Than to Stop Malware –...
Machine Learning (ML) has become the shiny new object for security and is the foundational pillar of products such as Next-Generation Antivirus (NGAV) and User and Entity Behavior Analytics (UEBA)....
View Article7 Tips To Protect Against Ransomware
In the analog world of the past, a business’s resources were considered safe as long as the doors were locked. Though in today’s digital world, criminals have the opportunity to break into a business...
View ArticleWhat is PCI Compliance? Why is it important? | Infographic by BluePay
Infographic produced by payment processing company BluePay The post What is PCI Compliance? Why is it important? | Infographic by BluePay appeared first on eForensics.
View ArticleA Practical and Hands-On Intro to Ciphers and Signals for Parents and Kids |...
A Practical and Hands-On Intro to Ciphers and Signals for Parents and Kids by Dennis Chow, MBA Introduction for Parents and Educators: There is much discussion around cyber security skills and talent...
View ArticleOpenBSD OpenSMTPD Remote Code Execution Vulnerability (CVE-2020-7247)| by...
OpenBSD OpenSMTPD Remote Code Execution Vulnerability (CVE-2020-7247) Qualys Research Labs discovered a vulnerability in OpenBSD’s OpenSMTPD mail server that allows an attacker to execute arbitrary...
View ArticleHunting for Nextcloud Cloud Storage Forensic Artifacts on Endpoints | by Oleg...
Hunting for Nextcloud Cloud Storage Forensic Artifacts on Endpoints Nextcloud is free and open source suite of client-server software for creating and using file hosting services, so it can be...
View Article