Рубрика: Новости

Январь 3

Forensics Quickie: Methodology for Identifying Linux ext4 Timestamp Values in debugfs `stat` Command Data Carving with Foremost Detecting Tor communications Cloud Forensics in Breach Investigations Anatomy of the thread suspension mechanism in Windows Hasty Scripts: Capture Google Activity Log Forensic Implications of Software Updates: iOS, Android, Windows 10 Mobile Forensic Case Files: Employee Hard Drive…

Прочитать статью целиком

Январь 2

Recovering deleted internet history from System Restore points Windows Console Command History: Valuable Evidence for Live Response Investigation iOS Imaging on the Cheap! – Part Deux! (for iOS 10 & 11) Forensically Collecting Emails — 5 Things to Know Evidence acquisition workflow in 5 steps Defending Against an Advanced Persistent Threat (APT) 8 Steps to…

Прочитать статью целиком


Новости компьютерной криминалистики How to mount Mac APFS images in Windows Mounting an APFS image in Linux Volatility plugin to extract BitLocker Full Volume Encryption Keys Database Reverse Engineering ADRecon Overview A List of Incident Response sources Aaron at DigitalResidue provides a primer on virtual memory and explains a few Volatility plugins damn blogger.com Mobile…

Прочитать статью целиком


Новые исследования в компьютерной криминалистике Adventures in Laptop Forensics  Another OSX.Dok dropper found installing new backdoor Snake malware ported from Windows to Mac  HandBrake Hacked!  Super Free Music Player in Google Play is malware: a technical analysis  Police Backlogs—Is Throwing Bodies at the Problem the Answer?  Practical Packet Analysis Photo Contest