Digital forensics

Investigating the crime scene part 2: Recovering files with autopsy

For part one of this series, please click here. So, in the previous part we saw how we can set up the environment for finding clues and also how to set up A

Investigating the Crime Scene, Part 1: A Brief Introduction to Computer Forensics and Autopsy

Recommended reading http://www.thestudymaterial.com/presentation-seminar/computer-presentation/239-computer-forensics-presentation.html?showall=1 First Re

Installing and Running the Honeypot

This article is in continuation of Part 1 of the series on Ghost USB Honeypot. Malware threats have become very common these days and hence the need of honey

New Linux Distro for Mobile Security, Malware Analysis, and Forensics

Yes, you read the title right and I hope I just grabbed your attention! A new GNU/Linux distribution or distro designed for helping you in every aspect of yo

Rock Solid: Will Digital Forensics Crack SSDs?

Digital forensics is one of the most interesting and exciting fields of information security that you can ever be fortunate enough to work in, but not for th

The Case of the Great Router Robbery

NEWSFLASH: AnyTown Local News reports this Monday morning that the recent spate of office break-ins has continued with a weekend raid on the downtown branch

Computer Forensics: Snort Logs Analysis

Sometimes the best evidence of a network intrusion resides in network or traffic logs. Snort is a well known open-source traffic analysis and network intrusi