Blog2018-08-27T16:56:57-06:00

Digital Forensics & Cyber Security Blog

Digital Forensics & Cyber Security Blog

Rusolut Visual NAND Reconstructor 4.2 is now available to Registered Users

eMMC-NAND RECONSTRUCTOR is a solution for data extraction and recovery from eMMC chips through NAND interface. It is ultimate and revolutionary technology that is mainly designed for law enforcement (mobile forensics and other areas). It provides the deepest level of data recovery from areas of eMMC chips that have never [...]

Social Network Harvester (SNH) – Software for Social Network Forensics

Collect - Analyze - Visualize social media information Social Network Harvester (SNH) is an automated, investigative solution for law enforcement agencies, management consultancies, law firms, detective agencies or others who collect and evaluate data from social networks. The Social Network Harvester (SNH) comprehensively analyzes and visualizes friendship relationships, posts, images, [...]

Future of IoT: 6 trends and predictions to watch

Although challenges with IoT security and data privacy persist, IoT will continue to grow, propelled by targeted business goals and AI for data analytics. 1. IoT projects will be driven by business goals, not technology 2. IoT architectural groundwork will create more use cases 3. Interoperability issues will eventually winnow [...]

Top 12 most commonly used IoT protocols and standards

There were 11.7 billion IoT connections in 2020 versus 10 billion non-IoT connections -- e.g., smartphones and computers -- according to market research firm IoT Analytics. And researchers there estimated the number of IoT connections will swell to 30.9 billion by 2025. By Mary K. Pratt

Sarcos Robotics is making Iron Man suits for the Government

Imagine a futuristic robotic suit—something out of an Iron Man movie—that uses technology and years of research to combine the intelligence, instinct, and judgment of humans with the strength, endurance, and precision of machines… Twenty years in the making, Sarcos Robotics is a Salt Lake City outpost that’s currently leading [...]

Microsoft makes Universal Print generally available

Microsoft wants Universal Print to replace on-premises print servers. The cloud service provides printer management and eliminates the use of printer drivers. Universal Print, released in preview last year, simplifies printer management. Workers no longer need drivers on their PCs to print documents in the office or at home. IT [...]

Smartphones, Mobile Devices, IoT, and You

How many devices are you connected too? How many Apps do you have on your smartphone? The number of Internet of Things (IoT) devices grows every day. Some estimate that by the end of this year (2021) there will be almost 14 Billion IoT connections and over 30 Billion connections [...]

Van Down by the River

I saw this picture today... had to laugh However, to really understand the photo, you need to watch this Matt Foley moment and then Matt Foley in Halloween Fun Two of the of the best Saturday Night Live (SNL) Sketches of all time! Rest in Peace Chris Farley and Phil [...]

H-11 Digital Forensics – Find Deleted Data

When you a delete a file, it isn't really erased, or is it? When a file is deleted, most Operating and/or File Systems, on a mobile device or computer, mark the location of that data as "deleted" and also as "available" for new data to be stored in that location [...]

Unpacking of Egregor Ransomware – Malware Analysis (LIFARS Case Study)

LIFARS Case Study Executive Summary In this case study, we describe malware analysis and unpacking of a newly emerged ransomware Egregor. It is an extremely targeted ransomware that tries to extort big companies. The sample that we analyzed was obtained by our colleagues during an incident response at our client’s [...]

Go to Top