Greetz to dear reader’s, Digital Forensics (4n6)šµļøāāļø itself as one of the emerging domain in information security. And Smartphone forensics is one of them, It is a subset of digital forensics and refers to the investigation and acquisition of artefacts in mobile phones š² When we talking about mobile phone forensics then it depends on…
Category: Digital Forensic
FILELESS MALWARE ATTACKS : INTRO
FILELESS MALWARE ATTACKS Unlike attacks carried out using traditional malware, fileless malware attacks donāt entail attackers installing software on a victimās machine. This means that thereās NO signature for antivirus software to detect, greatly decreasing the effectiveness of these programs in detecting fileless malware attacks. And these attacks are almost 10 times more likely to…
FORENSICS FRAMEWORKS/MODELS
First thanks to all respected readers. Trying to amalgamate almost models framework of forensics by this article. Welcoming your views and comments. Well, Forensics āThe application of scientific knowledge to legal problemsā So, What is Forensics (4n6) : Answer The aim of this article is to establish a clear guideline of what steps should be…
HACKER HACKED INTO FINANCIAL DOMAIN
++++++++++++++++++++++++++++++++++++++++++++++++++++++ Kenya :Ā Hackers steal Sh 30billion from Kenya’s financial institutions Team arrested at least 16 suspects including of a former police officer who is also touted as an IT guru, Insiders (KRA-Kenya Revenue Authority People) and a hacker who has been stealing money from local banks electronically in conjunction with a ring of other international…
CYBERCRIMINAL: MINDSET DRIVES BEHAVIOR
Quick Look: Psychology of an Eastern EuropeanĀ Cyber-Criminal Sharing one riveting stuff regarding criminal mindset. The usual conversation about Eastern European cyber-criminals does not differentiate them from criminals in other regions or address how they perceive the world differently. This disconnect makes it difficult to bring wrongdoers to justice and leads to breach after breach. We…
BANGLADESH BANK HEIST 2016 šµļø
Updated on 10 Feb 2019 In 2016, it was determined North Korea was linked to the $81 millionĀ Bangladesh Cyber Heist. We first reported on this incident in May of that year and surmised it was aĀ preventable attack. Our determination later proved correct as it turns out the institution knew they were unprepared but didnāt get…
CHALLENGES IN MOBILE FORENSICS
One of the biggest forensic challenges when it comes to the mobile platform is the fact that data can be accessed, stored, and synchronized across multiple devices. As the data is volatile and can be quickly transformed or deleted remotely, more effort is required for the preservation of this data. Mobile forensics is different from…
The Vigilante Who Hacked Hacking Team
Read about ethics of hacking, what is important in the world for “Phineas Fisher” and the choices we make. Hacker who hacked ‘The Hacking team’ The hacker who stole reams of secret documents from the controversial surveillance company Hacking Team has come forward to explain how he did it and why. In a lengthy post…
SPYING ON ANDROID USERS
Who Is Spying On Android Users, Why Do They Do It And What Are They Doing With The Data? If youāve been following the news, you may already know about the many cases where companies, big and small, were caught spying on their users. It might appear that just about everyone making a phone or an…
OVERVIEW OF DIGITAL FORENSICS
Cyber incidents are fast moving and increasing in number and severity. When a cyber incident occurs, the attacked enterprise responds with a set of predetermined actions. Applying digital forensics to aid in the recovery and investigation of material on digital media and networks is one of these actions. Digital forensics is the āprocess of identifying,…
EMAIL FORENSIC ANALYSIS TECHNIQUES
TIPS FOR ADVANCED EMAIL CONTENT ANALYSIS TECHNIQUES As we know almost just doing data extraction & reporting, not forensics.Ā Digital forensics is a branch of forensic science focusing on the recovery and investigation of raw data residing in electronic or digital devices. The goal of the process is to extract and recover any information from a…
How is Extortionware different from Ransomware?
For more Ā : Ā https://goo.gl/VYdsNC
HACKERS COMPROMISE GLOBAL BANKING SYSTEM
Interesting Informative Read Criminals can alter banks’ most sensitive data, allowing fake money transfers and credit card fraud. The global banking system has been compromised by cyber-criminals who have demonstrated they have high-level access that gives them nearly full control to alter data and steal from banks, according to an expert who has been investigating…
MIRAI IoT Botnet at a Glance
Found an interesting article, originally posted on Fortinet. Ever since the Mirai DDoS attack was launched a few weeks ago. Mirai, the infamous botnet used in the recent massive distributed denial of service (DDoS) attacks against Brian Krebsā blog and Dynās DNS infrastructure, has ensnared Internet of Things (IoT) devices in 164 countries, researchers say….
MOBILE DEVICE FORENSIC SOP & GUIDELINE – 1
MobileĀ deviceĀ forensicsĀ is a branch of digitalĀ forensicsĀ relating to recovery of digital evidence or data from aĀ mobileĀ device under forensically sound conditions. There is growing need for mobile forensics due to several reasons and some of the prominent reasons are: Use of mobile phones to store and transmit personal and corporate information Use of mobile phones in online transactions…
OPEN SOURCE VAPT & DFIR TOOLS
List of some tools : For Ā complete tools descriptions :Ā DFIR/VAPT Tools