Mahmoud O SwelamExploring .DS_Store Files in macOS Forensics: A Windows Shellbags EquivalentWhen conducting Digital Forensics and Incident Response (DFIR) investigations, one might wonder if there’s a macOS equivalent to Windows…1d ago
Christa MillerinAn Injustice!Why Do Good Justice Professionals Do Bad (or at Least Questionable) Things?Statistics and stories behind errors in forensic scienceDec 29, 20237
Rubens ZimbresHow to Check if your iPhone is Infected with Spyware/StalkerwareRecently I was watching Frontline PBS documentary “Global Spyware Scandal: Exposing Pegasus Part One (full documentary) | FRONTLINE”…Jan 164Jan 164
Adarsh PandeyLinux Incident Response and Forensics: A Comprehensive GuideIn today’s digital age, ensuring the security of Linux systems is paramount. Whether you’re a seasoned sysadmin or a budding cybersecurity…1d ago1d ago
Prateek DasguptainTeatime HistoryAttila the Hun’s Death: Investigating an Ancient MysteryCan history and forensics join hands to solve the puzzling death of one of history’s great conquerors?Sep 10, 202344Sep 10, 202344
Mahmoud O SwelamExploring .DS_Store Files in macOS Forensics: A Windows Shellbags EquivalentWhen conducting Digital Forensics and Incident Response (DFIR) investigations, one might wonder if there’s a macOS equivalent to Windows…1d ago
Christa MillerinAn Injustice!Why Do Good Justice Professionals Do Bad (or at Least Questionable) Things?Statistics and stories behind errors in forensic scienceDec 29, 20237
Rubens ZimbresHow to Check if your iPhone is Infected with Spyware/StalkerwareRecently I was watching Frontline PBS documentary “Global Spyware Scandal: Exposing Pegasus Part One (full documentary) | FRONTLINE”…Jan 164
Adarsh PandeyLinux Incident Response and Forensics: A Comprehensive GuideIn today’s digital age, ensuring the security of Linux systems is paramount. Whether you’re a seasoned sysadmin or a budding cybersecurity…1d ago
Prateek DasguptainTeatime HistoryAttila the Hun’s Death: Investigating an Ancient MysteryCan history and forensics join hands to solve the puzzling death of one of history’s great conquerors?Sep 10, 202344
ScriptTeaseMastering Volatility 2 and Volatility 3 Installation on Debian, Ubuntu, or Kali LinuxUnleash the formidable capabilities of Volatility, a powerful memory forensics tool, by setting up both Volatility 2 and Volatility 3 on…May 12
Efim Lerner🔍💻 How To Track Cybercriminals: Top Techniques Used By Digital Forensics Experts 🔒👨💻In the digital age, cybercrime has become a prevalent threat to individuals and organizations.1d ago
Tim Andersen, Ph.D.We may be close to the truth about the Shroud of TurinThe latest in the quest to understand the world’s most confusing relicAug 2, 202343