Interview with Kunal Dutt
eForensics Magazine
by
1w ago
In myriad cases, digital forensics comes into the picture, but the most generic answer would be “when the cyber security infrastructure fails somewhere around the cause of vulnerabilities, to identify and trace down the entire incident of this failure would be a process done by this glorious department known as digital forensics ..read more
Visit website
Incident Response and Forensics Foundamentals in AWS - LIVE WEBINAR with Afshan Naqvi
eForensics Magazine
by
1w ago
Welcome to the first live webinar by eForensics Magazine. My name is Bartek and I'm responsible for organizing online courses, mostly for PenTest Magazine and for Hackin9 Magazine, but also the most recent course of eForensics, which is instructed by Ms. Afshan Naqvi, who is present with us today ..read more
Visit website
Interview with Dauda Sule
eForensics Magazine
by
2w ago
You must be able to conduct lab exercises for students, particularly in digital forensics, and hold a minimum of a bachelor's degree in cyber security or a related discipline. You would definitely need to be able to demonstrate digital forensics skills with tools such as FTK Imager, Autopsy, and Wireshark, to name a few ..read more
Visit website
DFIR Labs in the Cloud: The Future of Digital Forensics
eForensics Magazine
by
2w ago
In this article, we will cover the ins and outs of adopting cloud solutions in digital forensics and explore how DFIR tools can accommodate this change. As an example, we will look into Belkasoft digital forensics software, known for its innovative solutions, and explore the features that enable it to embrace the cloud approach ..read more
Visit website
Using Two Tools for Smartphone Forensics Acquisitions
eForensics Magazine
by
1M ago
No greater area in digital forensics changes more frequently than smartphones. The many differences between manufacturers, regions, and devices can cause a wide range of problems when looking at the smartphone from an acquisition perspective. Keeping this in mind, the landscape of available tools has also changed dramatically over the past few years. With the development of more and more private tools vs open-source tools, there are a variety of options to select from. The following will review the different acquisition options between an open-source solution vs a private solution, and how the ..read more
Visit website
Enhance Visibility and Detection on Linux with Sysmon
eForensics Magazine
by
1M ago
Linux-based systems are the host operating system for cloud hosts, application servers, and a wide variety of internet of things (IoT) devices. Like any other operating system, it is susceptible to attacks. Sysmon for Linux is one of the famous Sysinternals tools available on Linux, improving host-based visibility and making detection and response to threats more efficient ..read more
Visit website
File Carving – What It Is and How to Get Started
eForensics Magazine
by
1M ago
File carving is a skill any forensic examiner will likely find themselves in need of at some point in their career, whether to recover deleted or damaged files, analyse data within an unallocated area of a storage device or work with fragmented data, understanding this technique is an almost certainty. This article aims to introduce the subject of file carving to forensic examiners, look at the difference between file carving and file recovery, demonstrate basic methods to carve files within a Windows and Linux environment and discuss some of the more advanced elements of file and data carving ..read more
Visit website
Advanced Digital Forensics with FTK Imager
eForensics Magazine
by
2M ago
FTK Imager is often used in conjunction with other forensic tools and is known for its reliability and effectiveness in digital investigations, such as in cases of data breaches, cybercrimes, and for corporate compliance ..read more
Visit website
Best Digital Forensic Tools
eForensics Magazine
by
2M ago
Digital forensic investigators use a variety of tools for various aspects of digital forensics, including data recovery, analysis, and reporting. Here is an overview of some of the most useful tools in the field, with links to more information about the tools or to the project pages ..read more
Visit website
ASU Studies Illegally Trafficked Bugs to Help Law Enforcement Catch Global Criminals
eForensics Magazine
by
2M ago
Surely, you’ve heard of the elephant tusk trade? Or rare jaguar skin that’s sold over the black market but have you ever heard of illegal bugs? These distinctive, contraband critters do exist, and they are trafficked illegally into the U.S. every year.  ..read more
Visit website

Follow eForensics Magazine on FeedSpot

Continue with Google
Continue with Apple
OR