Digital Forensics & Cyber Security Blog

Digital Forensics & Cyber Security Blog

Do you want a coffee?

Did you know you are being followed everywhere you go? Cell Phone providers constantly ping your phone and smart devices to see where you are. They hope they can reach you, their customers based on where you are or have been to direct you to new purchases. Some say where [...]

The ever-changing landscape for digital forensic tools…

In the ever-changing world of digital and mobile device forensics we are still seeing new technologies and tools being introduced around the world. There will be several new tools announced in the coming months. Perhaps at currently scheduled events… or maybe just a virtual summit to engage and enthuse digital [...]

Emoji Forensics

Emojis are everywhere - and that includes your evidence. What is an emoji? It is a small digital image or icon used to express and idea or an emotion. They are much like emoticons, but emoji are actual pictures instead of typographics. Originally meaning pictograph, the word emoji comes from Japanese (絵, "picture") + moji (文字, "character"); the [...]

Windows 10 Vulnerability

On January 14th, the National Security Agency (NSA) Cybersecurity Directorate head Anne Neuberger announced a critical Windows 10 bug that could have led more than 900 million PCs vulnerable to attack. On the same day, Microsoft immediately released a patch for Windows 10 and Server 2016 after NSA disclosed this vulnerability. Through [...]

University in Germany Handing Out Paper Passwords to 38,000 Students After Cyber Attack

The students at Justus Liebig University (JLU) Giessen have been asked to provide proof of identity in person because of "legal requirements". The attack, on 8 December, initially took the entire university offline. It told students it was investigating the incident with the help of Germany's Research Centre for Cyber [...]

My Christmas Eve

There are some stories that truly speak to the heart and retired Ohio State Trooper Bob Welsh’s touching poem, “My Christmas Eve”, is certainly one of them. With his permission, we had the honor of recreating his poem (original can be found here. Mr. Welsh’s poem represents our mission to [...]

Forensic Acquisition of Apple TV with checkra1n Jailbreak

Are you excited about the new checkm8 exploit? If you haven’t heard of this major development in the world of iOS jailbreaks, I would recommend to read the Technical analysis of the checkm8 exploit aricle, as well as Developer of Checkm8 explains why iDevice jailbreak exploit is a game changer. The good news is that [...]

Load More Posts