Forensic Analysis on Linux (Unix)
Operating Systems come in a few competing choices, of which the major players are Apple’s MacOS, Microsoft’s Windows and then the various flavours of Linux,… Read More »Forensic Analysis on Linux (Unix)
Operating Systems come in a few competing choices, of which the major players are Apple’s MacOS, Microsoft’s Windows and then the various flavours of Linux,… Read More »Forensic Analysis on Linux (Unix)
Cyber-attacks do not always originate from outside of the target organisation. Veritably around twenty-five percent of all data breaches occur from the inside, from employees… Read More »Investigation of insider attacks with computer forensics
Cyber forensics is hard, but it is even harder when servers are hosted in different geographical locations and an investigation needs all localities to cooperate… Read More »International hosting governments and forensic email cases
In Cyber Forensic there are a vast array of tools that are used throughout most investigations, however, not all jurisdictions allow or even agree to… Read More »Network Forensics Concerns around GDPR
Operating systems (OS) really have come a long way since the very first one was created by General Motors in 1956 (WIHT, 2017) to run… Read More »A look into Future Developments in Operating Systems from a Cyber Forensics Investigator
In digital and cyber forensics, there are three main types of categories when it comes to forensic tooling. They can be considered as: Graphical User… Read More »Comparing Interface Types in Cyber Forensics
Investigations are not proven in a jurisdiction until a detailed forensic report is created and presented to a judge or jury who can take it… Read More »Cyber Forensic Investigative Reports
Ever since it has been possible for humans to operate computers, some have used it to perform criminal activities. Part of a cybercriminal’s gameplay is… Read More »Altering Computer Evidence