Quantcast
Channel: Technical Resources about Computer Forensics and Data Recovery » Computer Forensics
Browsing latest articles
Browse All 10 View Live

Fake anti-virus software

I have found one of the more pertinacious menaces of 2010 was “fake antivirus, commonly titled “scareware” or “rogueware.” This is a widespread practice for software to manipulate victim’s to install...

View Article


Image may be NSFW.
Clik here to view.

Social engineering techniques on social networks

Firstly, what is social engineering? It is a catch all term for intellectual bluff’s used to convince people to attenuate their online security. Ways to achieve this is by clicking a button, opening an...

View Article


Image may be NSFW.
Clik here to view.

How to avoid being fooled by social engineering techniques

1. That old saying, how does it go? “If something is too good to be true, it probably is”. 2. A important question to ask yourself would be , “Why am I being singled out for special treatment or a...

View Article

Image may be NSFW.
Clik here to view.

Great example of email scam

Just to follow up on my post “HOW TO AVOID BEING FOOLED BY SOCIAL ENGINEERING TECHNIQUES”

View Article

IP Address from Gmail Account – Case Study

A commercial organisation asked me to investigate a series of suspicious emails they had received. I will not divulge the details of the case, but can reveal the processes involved. Every email...

View Article


Image may be NSFW.
Clik here to view.

Social network

Applications I will be discussing the world’s largest social networking platform and also the most targeted by hackers and cybercriminals. This site is known as Facebook and has some serious problems...

View Article

Forensically Examining Images and Photographs

I was recently asked by a solicitor to examine images to determine if they have been digitally manipulated. There are a number of processes I use including Photoshop forensic techniques and Error Level...

View Article

Image may be NSFW.
Clik here to view.

The Future of Solid State Disk Data Recovery

Many data recovery tools are universal regardless of the HDD manufacturer. So it has been relatively simple to get data back regardless of whether the affected disk was built by Maxtor, Seagate or...

View Article


Image may be NSFW.
Clik here to view.

What is Photographic Forensics and Image Analysis?

Photographic forensics or image analysis is the interrogation of digital images to extract meaningful information; mainly from digital photographs by means of digital image processing techniques....

View Article


Image may be NSFW.
Clik here to view.

Penetration Testing – What is it?

Over the last 3 months I have been devoting a large number of hours towards the art of Penetration Testing (Pen Testing). I thought I would write a post about this subject to explain what it is. It is...

View Article
Browsing latest articles
Browse All 10 View Live