Digital forensics

Webinar summary: Digital forensics and incident response — Is it the career for you?

Introduction Infosec held a webinar with Cindy Murphy to find out about what it takes to get started in digital forensics and incident response. Cindy gives

Web Traffic Analysis

Introduction: Significance and Impact In 2018 DayTrek Corp, a broadband and data communications company in the UK discovered a cross-site request-exploit on

Network forensics overview

Most attacks move through the network before hitting the target and they leave some trace. According to Locard’s exchange principle, “every contact leaves a

Eyesight to the Blind – SSL Decryption for Network Monitoring [Updated 2019]

SSL and network monitoring aren't the most compatible of partners – even with the most sophisticated detection infrastructure in the world, you'll not derive

Gentoo Hardening: Part 4: PaX, RBAC and ClamAV [Updated 2019]

Grsecurity and Xorg If we enable the "Disable privileged I/O" feature in the hardened kernel and reboot, we can't start X server. That's because Xorg uses pr

Computer forensics: FTK forensic toolkit overview [updated 2019]

In your career as a computer forensics professional, you will often find that your efficiency boils down to which tool you are using for your investigations.

The mobile forensics process: steps and types

Introduction: Importance of mobile forensics The term “mobile devices” encompasses a wide array of gadgets ranging from mobile phones, smartphones, tablets,

Free & open source computer forensics tools

According to Juniper Research, cybercrime losses to businesses will surpass $2 trillion by the year 2019. With data breaches occurring all around the world e

An Introduction to Computer Forensics

Introduction One of the biggest threats facing businesses and corporations today is that of Cyber-attacks and threats. If these are large enough in scale an

Common mobile forensics tools and techniques

Data acquisition is the process of gathering information from mobile devices and their associated media. This process reduces the chances of data loss due to