SANS DFIR, Jason Jordaan’s ‘Understanding The Forensic Science In Digital Forensics’

Thanks to SANS for publishing the SANS DFIR superlative DFIR videos on their SANS DFIR YouTube Channel Permalink ...

Webinar: Wireshark for Hackers

Register Now for a Packet Level Foundation in Incident Response! Join Laura Chappell as she demonstrates Wireshark’s use as a network forensics tool. Laura will walk you through some tricks used to ...
42% of used drives sold on eBay hold sensitive data, researchers find

42% of used drives sold on eBay hold sensitive data, researchers find

Selling your old hard drive on eBay may sound like a good way to squeeze a few extra bucks from unused hardware, but not if you don’t erase the data properly. A ...

Popular Computer Forensics Top 21 Tools [Updated for 2019]

| | feature, forensics
Computer forensics is a very important branch of computer science in relation to computer and Internet related crimes. Earlier, computers were only used to produce data but now it has expanded to ...
Security Incident Potentially Exposed 100 Million Quora Users’ Personal Data

Security Incident Potentially Exposed 100 Million Quora Users’ Personal Data

A security incident at Quora potentially compromised the personal information and other details of approximately 100 million users. On 30 November, the question-and-answer website identified that a third party had gained access ...

Video: Blockchain Hacking for Investigating Cryptocurrencies

Video and Slide Deck from EH-Net Live! Oct 2018 Follow the money. Be it business, politics or crime, this is a common method of trying to find out who's involved and their ...
EH-Net Live! Oct 2018 - Hacking Blockchain for Investigating Cryptocurrenices - Book Cover

Webinar: Blockchain Hacking for Investigating Cryptocurrencies on Oct 24 2018

Register Now to Learn Blockchain Hacking Step-by-Step! Nick Furneaux, forensics trainer, investigator & author of "Investigating Cryptocurrencies" takes you through a journey of code and tools to unpick the movement of illegal ...

What is a Honey Pot?

| | feature, forensics, Hacking
1. Introduction Honeypots are special programs that are written for a sole purpose: to be exploited. Honeypots can emulate the existence of the vulnerability, so the attackers, viruses and worms are... Go ...

Gentoo Hardening: Part 4: PaX, RBAC and ClamAV [Updated 2018]

| | feature, forensics
Grsecurity and Xorg If we enable the “Disable privileged I/O” feature in the hardened kernel and reboot, we can’t start X server. That’s because Xorg uses privileged I/O... Go on to the ...

New Report on Police Digital Forensics Techniques

According to a new CSIS report, "going dark" is not the most pressing problem facing law enforcement in the age of digital data: Over the past year, we conducted a series of ...
Loading...