Forensic Analysis on Linux (Unix)
Operating Systems come in a few competing choices, of which the major players are Apple’s MacOS, Microsoft’s Windows and then the various …
Read Article →8 articles about forensics development, tools, and best practices
Operating Systems come in a few competing choices, of which the major players are Apple’s MacOS, Microsoft’s Windows and then the various …
Read Article →Cyber-attacks do not always originate from outside of the target organisation. Veritably around twenty-five percent of all data breaches occur from …
Read Article →Cyber forensics is hard, but it is even harder when servers are hosted in different geographical locations and an investigation needs all localities …
Read Article →In Cyber Forensic there are a vast array of tools that are used throughout most investigations, however, not all jurisdictions allow or even agree to …
Read Article →Operating systems (OS) really have come a long way since the very first one was created by General Motors in 1956 (WIHT, 2017) to run on an IBM …
Read Article →In digital and cyber forensics, there are three main types of categories when it comes to forensic tooling. They can be considered as:
Investigations are not proven in a jurisdiction until a detailed forensic report is created and presented to a judge or jury who can take it to the …
Read Article →Ever since it has been possible for humans to operate computers, some have used it to perform criminal activities.
Part of a cybercriminal’s …
Read Article →