Quantcast
Channel: Blog – eForensics
Browsing all 378 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Get ready for Practical Social Engineering course (Part 1.1) –“NLH in the...

In preparation for our upcoming Practical Social Engineering course we have decided to share with you articles, materials and essays on the topic of social engineering that our publishing company has...

View Article


Digital Forensics Hall of Fame, Episode 2: The Death of Sharon Lopatka

Welcome to the Digital Forensics Hall of Fame, where we talk about the most famous cases in history solved by digital forensics. The second episode will tell us the story of Sharon Lopatka, whose...

View Article


Image may be NSFW.
Clik here to view.

ELA Photo Forensics

By: Pierluigi Paganini from Infosec Institute Error Level Analysis is a forensic method to identify portions of an image with a different level of compression. The technique could be used to determine...

View Article

Image may be NSFW.
Clik here to view.

Get ready for Practical Social Engineering course (Part 1.2) –“NLH in the...

In preparation for our upcoming Practical Social Engineering course we have decided to share with you articles, materials and essays on the topic of social engineering that our publishing company has...

View Article

101 Best Forensics Tutorials E-Book is now available!

We have decided to publish our “101 Best Forensics Tutorials” issue as an e-book, for everyone to buy and download! If you are our subscriber, you have probably already downloaded this issue, if not –...

View Article


RDS1025 Wave Rambler USB Pen PC Oscilloscope from Sain Smart

Reviewed by Bob Monroe 2 June 2015 There is an old business motto that says “If you can’t measure it, you can’t manage it.” Of course this is baloney because intangibles like your reputation, trust,...

View Article

Image may be NSFW.
Clik here to view.

“Incredibly exciting time for the security industry”– Interview with David...

Barricade is an innovative security company based in Ireland. Their solutions work based on machine learning and artificial intelligence, in a successfull  attempt to democratize and simplify security....

View Article

Image may be NSFW.
Clik here to view.

Automation is crucial for reducing costs and operational overhead – interview...

[eForensics Magazine]: Having too much data to sift through is becoming one of the biggest problems for SOCs around the world. How do your new tools help with solving it? [Matan Kubovsky]: In today’s...

View Article


Become a Cyber Security Expert: Get Training & Certifications for CISA, CISM,...

|| by Priya Jatoliya Surprising though it might be, you must already have realized by now that any computer with an internet connection is subject to risks of virus attacks. There are other malware and...

View Article


IT Certification and Career Guide | Infographic by TrainACE

IT Certification And Career Guide from TrainACE The post IT Certification and Career Guide | Infographic by TrainACE appeared first on eForensics.

View Article

Image may be NSFW.
Clik here to view.

Top Reasons Why Your Business Needs to Archive Text Messages | Infographic...

Source >>  The post Top Reasons Why Your Business Needs to Archive Text Messages | Infographic from TeleMessage appeared first on eForensics.

View Article

Cloud Computing Is Changing The Security Space – Here’s What You Need To Know

 by Tim Mullahy,  Liberty Center One  In 2016, 14 million small businesses were hacked. It’s a statistic that speaks to a disturbing trend in the digital underworld – criminals have realized how much...

View Article

The Heathrow Breach Is Something That Could Happen To Any Of Us – How You Can...

by Max Emelianov,  HostForWeb You’ve doubtless heard the news by now. An unemployed man. A USB drive. Critical security data. This sort of thing could easily happen to you, too. Plenty of folks...

View Article


Will 2018 Be The Year We Say Goodbye To Passwords?

by Matthew Davis,  Future Hosting People are bad at using passwords. They create passwords that can be guessed in fractions of a second by modern password cracking systems. They use the same passwords...

View Article

Why Machine Learning is More Likely to Cure Cancer Than to Stop Malware –...

Machine Learning (ML) has become the shiny new object for security and is the foundational pillar of products such as Next-Generation Antivirus (NGAV) and User and Entity Behavior Analytics (UEBA)....

View Article


7 Tips To Protect Against Ransomware

In the analog world of the past, a business’s resources were considered safe as long as the doors were locked. Though in today’s digital world, criminals have the opportunity to break into a business...

View Article

Image may be NSFW.
Clik here to view.

What is PCI Compliance? Why is it important? | Infographic by BluePay

Infographic produced by payment processing company BluePay The post What is PCI Compliance? Why is it important? | Infographic by BluePay appeared first on eForensics.

View Article


Image may be NSFW.
Clik here to view.

A Practical and Hands-On Intro to Ciphers and Signals for Parents and Kids |...

A Practical and Hands-On Intro to Ciphers and Signals for Parents and Kids by Dennis Chow, MBA   Introduction for Parents and Educators: There is much discussion around cyber security skills and talent...

View Article

Image may be NSFW.
Clik here to view.

OpenBSD OpenSMTPD Remote Code Execution Vulnerability (CVE-2020-7247)| by...

OpenBSD OpenSMTPD Remote Code Execution Vulnerability (CVE-2020-7247)   Qualys Research Labs discovered a vulnerability in OpenBSD’s OpenSMTPD mail server that allows an attacker to execute arbitrary...

View Article

Image may be NSFW.
Clik here to view.

Hunting for Nextcloud Cloud Storage Forensic Artifacts on Endpoints | by Oleg...

Hunting for Nextcloud Cloud Storage Forensic Artifacts on Endpoints    Nextcloud is free and open source suite of client-server software for creating and using file hosting services, so it can be...

View Article
Browsing all 378 articles
Browse latest View live