Forensics

Forensic Analysis on Linux (Unix)

Operating Systems come in a few competing choices, of which the major players are Apple’s MacOS, Microsoft’s Windows and then the various flavours of Linux, of which most are open-sourced while the remainder are proprietary to their vendors.

Read More

Investigation of insider attacks with computer forensics

Cyber-attacks do not always originate from outside of the target organisation.

Read More

International hosting governments and forensic email cases

Cyber forensics is hard, but it is even harder when servers are hosted in different geographical locations and an investigation needs all localities to cooperate and hand over every part of the data consistently.

Read More

Network Forensics Concerns around GDPR

In Cyber Forensic there are a vast array of tools that are used throughout most investigations, however, not all jurisdictions allow or even agree to the usage of some of them.

Read More

A look into Future Developments in Operating Systems from a Cyber Forensics Investigator

Operating systems (OS) really have come a long way since the very first one was created by General Motors in 1956 (WIHT, 2017) to run on an IBM mainframe.

Read More

Comparing Interface Types in Cyber Forensics

In digital and cyber forensics, there are three main types of categories when it comes to forensic tooling.

Read More

Cyber Forensic Investigative Reports

Investigations are not proven in a jurisdiction until a detailed forensic report is created and presented to a judge or jury who can take it to the next level.

Read More

Altering Computer Evidence

Ever since it has been possible for humans to operate computers, some have used it to perform criminal activities.

Read More