Forensic Analysis on Linux (Unix)
May 29, 2020
Operating Systems come in a few competing choices, of which the major players are Apple’s MacOS, Microsoft’s Windows and then the various flavours of Linux, of which most are open-sourced while the remainder are proprietary to their vendors.
Read More
Investigation of insider attacks with computer forensics
October 7, 2018
Cyber-attacks do not always originate from outside of the target organisation.
Read More
International hosting governments and forensic email cases
September 30, 2018
Cyber forensics is hard, but it is even harder when servers are hosted in different geographical locations and an investigation needs all localities to cooperate and hand over every part of the data consistently.
Read More
Network Forensics Concerns around GDPR
September 23, 2018
In Cyber Forensic there are a vast array of tools that are used throughout most investigations, however, not all jurisdictions allow or even agree to the usage of some of them.
Read More
A look into Future Developments in Operating Systems from a Cyber Forensics Investigator
September 16, 2018
Operating systems (OS) really have come a long way since the very first one was created by General Motors in 1956 (WIHT, 2017) to run on an IBM mainframe.
Read More
Comparing Interface Types in Cyber Forensics
September 2, 2018
In digital and cyber forensics, there are three main types of categories when it comes to forensic tooling.
Read More
Cyber Forensic Investigative Reports
August 26, 2018
Investigations are not proven in a jurisdiction until a detailed forensic report is created and presented to a judge or jury who can take it to the next level.
Read More
Altering Computer Evidence
August 19, 2018
Ever since it has been possible for humans to operate computers, some have used it to perform criminal activities.
Read More