forensics

  1. whoosh

    VIDEO The Ancient Secrets Of Peru's Mummified Female Warrior | Mummy Forensics | Odyssey

    🤔
  2. whoosh

    VIDEO Grave robbers STOLE HIS BODY looking for a valuable ring that SHE GAVE HIM!

    :curious:
  3. whoosh

    VIDEO Most of the dead Astroworld Festival victims were in one highly packed area | Visual Forensics

    Terrible tragedy :eek:
  4. whoosh

    VIDEO How Law Enforcement Breaks into iPhones

    :rolleyes:
  5. News

    VIDEO AA21-077A: Detecting Post-Compromise Threat Activity Using the CHIRP IOC Detection Tool

    Original release date: March 18, 2021 Summary This Alert announces the CISA Hunt and Incident Response Program (CHIRP) tool. CHIRP is a forensics collection tool that CISA developed to help network defenders find indicators of compromise (IOCs) associated with activity detailed in the following...
  6. C

    Windows 10 What are the best Windows artefacts to look for a system hack?

    Hi I am an aspiring computer security investigator, I am currently creating a security respondent plan for a hacked Windows 10 machine. I’m using forensic autopsy software for testing purposes. I have no idea what the hack is yet, I’ve just been told to think of possible scenarios of where to...
  7. News

    Acquiring a VHD to Investigate

    In a previous post we described some of the differences between on-premises/physical forensics and cyber investigations and those performed in the cloud, and how this can make cloud forensics challenging. That blog post described a method of creating and maintaining a VM image which can be...
  8. News

    Scalable infrastructure for investigations and incident response

    Traditional computer forensics and cyber investigations are as relevant in the cloud as they are in on-premise environments, but the methods in which to access and perform such investigations differ. This post will describe some of the challenges of bringing on-premises forensics techniques to...
  9. News

    Microsoft’s Cyber Defense Operations Center shares best practices

    Today, a single breach, physical or virtual, can cause millions of dollars of damage to an organization and potentially billions in financial losses to the global economy. Each week seems to bring a new disclosure of a cybersecurity breach somewhere in the world. As we look at the current state...
  10. News

    TA15-213A: Recent Email Phishing Campaigns – Mitigation and Response Recommendations

    Original release date: August 01, 2015 Systems Affected Microsoft Windows Systems, Adobe Flash Player, and Linux Overview Between June and July 2015, the United States Computer Emergency Readiness Team (US-CERT) received reports of multiple, ongoing and likely evolving, email-based phishing...
  11. News

    TA14-212A: Backoff Point-of-Sale Malware

    Original release date: July 31, 2014 Systems Affected Point-of-Sale Systems Overview This advisory was prepared in collaboration with the National Cybersecurity and Communications Integration Center (NCCIC), United States Secret Service (USSS), Financial Sector Information Sharing and...
  12. whoosh

    VIDEO Human remains found on royal estate

    :o
  13. reghakr

    Sperm-sniffing police dog snags rapist

    A 23-year-old man has been charged with rape in Karlskrona, after Rapports Opus, southern Sweden's only police dog specialised in sniffing sperm, caught a whiff of his case. Read Full Story: Link Removed
  14. reghakr

    Met Police arrest alleged hacker in Essex

    The Metropolitan Police Central e-Crime Unit (PCeU) has Link Removed that it has arrested a 19 year old man. Intelligence learned of an address, then seized the computer for forensic examination. Read Full Story: Met Police arrest alleged hacker in Essex - The H Security: News and Features
  15. reghakr

    Microsoft fingers Russians over Rustock spam botnet

    The Rustock botnet, taken down earlier this year in a Microsoft-led action, appears to have been operated by Russians according to evidence collected by the company. Court action by Microsoft saw the Rustock botnet taken offline in March, causing an almost immediate drop in global spam...
  16. cybercore

    Son kept father's corpse in wardrobe for five years

    Link Removed - Invalid URL Police here are investigating a man for abandoning a corpse after his father's mummified remains were believed found in a wardrobe at the apartment the father and son shared. According to police, Mitsuo Sonoda's 55-year-old son, currently in hospital, has admitted...
  17. cybercore

    Man survives after been shot 21 times by police

    Man survives after been shot 21 times by police (August 2010) A 23-year-old man is counting his luck today after he survived being shot 21 times by police. Armed officers were involved in a shoot-out with the 23-year old named as Angel Alvarez at a New York street party. It’s claimed that...
  18. Mike

    VIDEO BSOD, Crash Dump, and Minidump Analysis

    In this video, I bring you into the world of the elusive Blue Screen of Death, and the forensic level of study required to analyze such crashes. At Windows 7 Forums, we have an entire team of BSOD experts, many of whom are prolific, ingenious members that know their stuff. Although I am 7x...
  19. reghakr

    Windows 7 Blazing fast password recovery with new ATI cards

    ElcomSoft accelerates the recovery of Wi-Fi passwords and password-protected iPhone and iPod backups by using ATI video cards. The support of ATI Radeon 5000 series video accelerators allows ElcomSoft to perform password recovery up to 20 times faster compared to Intel top of the line quad-core...
  20. xrams

    Windows Vista Hard drive dump...

    I'm sure this has been covered in someway shape or form.... however, my searches yielded nothing... I know you geniuses can give me a some what quick solution... I have a HP pc with two 500g HDDs... I've been having a great deal a trouble with hacking... I found scripts and viruses...
Back
Top