Blog2018-08-27T16:56:57-06:00

Digital Forensics & Cyber Security Blog

Digital Forensics & Cyber Security Blog

Exporting your data from Google

Exporting your data from Google It’s no secret that Google collects immense amounts of data from its users every day. Locations, photos, messages and more, it’s all in the cloud. Ever wonder what they have on you? Fortunately Google makes it easy to [...]

923 words on Windows NTUSER.dat

LIFARS Technical Guide In this article we will be focusing only on NTUSER.DAT and not on related registry hives or artifacts that are not located within NTUSER hive. This file which stores user profile and settings information can be useful in many use cases. We can gain evidence of program [...]

Best Ways to Sanitize and Kill the Viruses Living on Your iPhone

Whether it’s keeping the screen pristine or regularly cleaning out ports, most iPhone owners do their part to keep their device in good shape. But how can an iPhone affect your own physical health? With recent attention turning to cleanliness as a high-priority concern, there are now more reasons than [...]

Do you want a coffee?

Did you know you are being followed everywhere you go? Cell Phone providers constantly ping your phone and smart devices to see where you are. They hope they can reach you, their customers based on where you are or have been to direct you to new purchases. Some say where [...]

The ever-changing landscape for digital forensic tools…

In the ever-changing world of digital and mobile device forensics we are still seeing new technologies and tools being introduced around the world. There will be several new tools announced in the coming months. Perhaps at currently scheduled events… or maybe just a virtual summit to engage and enthuse digital [...]

Emoji Forensics

Emojis are everywhere - and that includes your evidence. What is an emoji? It is a small digital image or icon used to express and idea or an emotion. They are much like emoticons, but emoji are actual pictures instead of typographics. Originally meaning pictograph, the word emoji comes from Japanese (絵, "picture") + moji (文字, "character"); the [...]

Windows 10 Vulnerability

On January 14th, the National Security Agency (NSA) Cybersecurity Directorate head Anne Neuberger announced a critical Windows 10 bug that could have led more than 900 million PCs vulnerable to attack. On the same day, Microsoft immediately released a patch for Windows 10 and Server 2016 after NSA disclosed this vulnerability. Through [...]

Go to Top