SMARTPHONE FORENSICS – 2

Greetz to dear reader’s, Digital Forensics (4n6)🕵️‍♂️ itself as one of the emerging domain in information security. And Smartphone forensics is one of them, It is a subset of digital forensics and refers to the investigation and acquisition of artefacts in mobile phones 📲 When we talking about mobile phone forensics then it depends on…

FILELESS MALWARE ATTACKS : INTRO

FILELESS MALWARE ATTACKS Unlike attacks carried out using traditional malware, fileless malware attacks don’t entail attackers installing software on a victim’s machine. This means that there’s NO signature for antivirus software to detect, greatly decreasing the effectiveness of these programs in detecting fileless malware attacks. And these attacks are almost 10 times more likely to…

FORENSICS FRAMEWORKS/MODELS

First thanks to all respected readers. Trying to amalgamate almost models framework of forensics by this article. Welcoming your views and comments. Well, Forensics “The application of scientific knowledge to legal problems“ So, What is Forensics (4n6) : Answer The aim of this article is to establish a clear guideline of what steps should be…

HACKER HACKED INTO FINANCIAL DOMAIN

++++++++++++++++++++++++++++++++++++++++++++++++++++++ Kenya : Hackers steal Sh 30billion from Kenya’s financial institutions Team arrested at least 16 suspects including of a former police officer who is also touted as an IT guru, Insiders (KRA-Kenya Revenue Authority People) and a hacker who has been stealing money from local banks electronically in conjunction with a ring of other international…

CYBERCRIMINAL: MINDSET DRIVES BEHAVIOR

Quick Look: Psychology of an Eastern European Cyber-Criminal Sharing one riveting stuff regarding criminal mindset. The usual conversation about Eastern European cyber-criminals does not differentiate them from criminals in other regions or address how they perceive the world differently. This disconnect makes it difficult to bring wrongdoers to justice and leads to breach after breach. We…

BANGLADESH BANK HEIST 2016

In February 2016, instructions to steal US$951 million from Bangladesh Bank, the central bank of Bangladesh, were issued via the SWIFT network. CID again fail 10th time to submit charge-sheet in court over Bangladesh Bank reserves heist (17 Jan 2017) The case, initiated under the Money Laundering Prevention Act and the ICT Act. The Bangladesh Bank…

CHALLENGES IN MOBILE FORENSICS

One of the biggest forensic challenges when it comes to the mobile platform is the fact that data can be accessed, stored, and synchronized across multiple devices. As the data is volatile and can be quickly transformed or deleted remotely, more effort is required for the preservation of this data. Mobile forensics is different from…

The Vigilante Who Hacked Hacking Team

Read about ethics of hacking, what is important in the world for “Phineas Fisher” and the choices we make. Hacker who hacked ‘The Hacking team’ The hacker who stole reams of secret documents from the controversial surveillance company Hacking Team has come forward to explain how he did it and why. In a lengthy post…

Spying On Android Users

Who Is Spying On Android Users, Why Do They Do It And What Are They Doing With The Data?  If you’ve been following the news, you may already know about the many cases where companies, big and small, were caught spying on their users. It might appear that just about everyone making a phone or an…

OVERVIEW OF DIGITAL FORENSICS

Cyber incidents are fast moving and increasing in number and severity. When a cyber incident occurs, the attacked enterprise responds with a set of predetermined actions. Applying digital forensics to aid in the recovery and investigation of material on digital media and networks is one of these actions. Digital forensics is the “process of identifying,…

EMAIL FORENSIC ANALYSIS TECHNIQUES

TIPS FOR ADVANCED EMAIL CONTENT ANALYSIS TECHNIQUES As we know almost just doing data extraction & reporting, not forensics. Digital forensics is a branch of forensic science focusing on the recovery and investigation of raw data residing in electronic or digital devices. The goal of the process is to extract and recover any information from a…

HACKERS COMPROMISE GLOBAL BANKING SYSTEM

Interesting Informative Read Criminals can alter banks’ most sensitive data, allowing fake money transfers and credit card fraud. The global banking system has been compromised by cyber-criminals who have demonstrated they have high-level access that gives them nearly full control to alter data and steal from banks, according to an expert who has been investigating…

MIRAI IoT Botnet at a Glance

Found an interesting article, originally posted on Fortinet. Ever since the Mirai DDoS attack was launched a few weeks ago. Mirai, the infamous botnet used in the recent massive distributed denial of service (DDoS) attacks against Brian Krebs’ blog and Dyn’s DNS infrastructure, has ensnared Internet of Things (IoT) devices in 164 countries, researchers say….

MOBILE DEVICE FORENSIC SOP & GUIDELINE – 1

Mobile device forensics is a branch of digital forensics relating to recovery of digital evidence or data from a mobile device under forensically sound conditions. There is growing need for mobile forensics due to several reasons and some of the prominent reasons are: Use of mobile phones to store and transmit personal and corporate information Use of mobile phones in online transactions…