Digital forensics

Computer Forensics: Mobile Device Hardware and Operating System Forensics

Introduction Mobile device and cell phone forensics is a field of Digital Forensics that is growing by leaps and bounds. Mobile phone data can be used as evi

The Types of Computer Forensic Investigations

Introduction Over the past several years, computer forensics, also known as digital forensics, has become a professional field. The worldwide proliferation o

Computer Forensics: Forensic Techniques, Part 2 [Updated 2019]

Introduction This is a continuation of our “Forensic Techniques” series, in which we discuss some of the most common yet powerful computer forensic technique

Notable computer forensics cases [updated 2019]

Cases involving computer forensics that made the news Michelle Theer (2000): On December 17th, 2000, John Diamond shot and killed Air Force Captain Mart

Computer Forensics: Anti-Forensic Tools & Techniques [Updated 2019]

Introduction Understanding the principles of digital forensics is essential for anyone looking to attain The Certified Computer Forensics Examiner (CCFE) cer

Computer forensics: Media & file system forensics [updated 2019]

A file system in a computer is the manner in which files are named and logically placed for storage and retrieval. It can be considered as a database or inde

Computer Forensics: Forensic Techniques, Part 1 [Updated 2019]

Introduction For any computer forensics professional, it is imperative to learn about as many forensics techniques as possible. This not only maximizes your

Commercial Computer Forensics Tools [Updated 2019]

Introduction Contrary to popular belief, the domain of digital forensics is far from being monolithic. From the outside looking in, it might appear that comp

More Free/Open Source Computer Forensics Tools

Introduction Nowadays, the number of security incidents have increased. If an organization's business is paralyzed by an unwanted or unforeseen event, the b

What Happens on the Endpoint Stays on the Endpoint

When attacks bypass endpoint security, it can often take months for enterprises to discover them. Some security reports even estimate that it requires U.S. c