Blog

Latest news around the world

eForensicsmag Team OfficialNew Edition

How Deepfake Works

Deepfake is a technique that involves using deep learning algorithms to create realistic video or audio content that appears to show someone saying or doing something they never actually did. Creating a deepfake usually involves two steps: first, training a deep learning model on large datasets of real footage, and second, using that model to generate new content 1.

Mar 13,2023

8 min read

How Technological Advancements in Forensic Technologies are Shaping Future of Crime Investigations

Increase in the incidences of crime across the globe has posed concerns across the globe. In the statistics presented by …

Mar 07,2023

7 min read

The Importance of Cybersecurity in the Digital Transformation of Business

With the digital revolution transforming businesses at an unprecedented pace, cybersecurity has become a top priority for companies across the …

Jan 23,2023

8 min read

Interview with Paulo Henrique Pereira

Paulo Henrique Pereira is a CyberSec Professional and Digits3c Founder working on malware analysis. Digits3c is his small intel company …

Mar 17,2023

6 min read

A Technical Analysis of Brazilian Electronic Voting Machines

For several years, there has been technical discussion about the electronic voting machines system, but when we talk about the system, it is not about the operating system used but about the technical process adopted.

Mar 17,2023

9 min read

Jeff Official

Unusual Emails: Investigating

For this article, we will be performing an OSINT investigation on an email that was sent to see what information we can find by verifying parts of the email’s content. This is a scenario based on real email investigations. As with any investigation, I do recommend exercising precaution (use a VM, sock puppet accounts, VPN, etc.). In terms of this article, you can assume that the previously mentioned precautions are already being exercised.

Mar 17,2023

10 min read

The Challenges of Collecting Evidence

Mobile devices such as smartphones have operating systems such as Android and iOS that allow for the installation of third-party applications that operate with restrictions of the operating system such as application isolation and other memory demands. This paper will explore the challenges of working with different operating systems while collecting evidence, and explain chipping off, live and postmortem mobile forensic analyses. 

Mar 17,2023

7 min read

Browser Forensics (W57)

The course is aimed at allowing investigators to know the inner workings of the most used and well-known browsers from a digital forensics perspective. Nowadays, everything is done using the web. Most applications are web-based, which led to the importance of browser forensics for any digital forensic case. The interesting thing about browser forensics is the amount of information that you can extract and draw for a case.

Oct 03,2022

10 min read

Cloud Forensics (W56)

Cloud computing is the on-demand availability of computer system resources, especially data storage and computing power, without direct active management by the user. Large clouds often have functions distributed over multiple locations, each location being a data center. The nature of cloud computing – particularly cloud service provider management and distribution over multiple locations – makes forensic investigations difficult and seemingly impossible. Data centers alone can be a separate forensic discipline. This course merges cloud technology with sound forensic processes and principles to effectively conduct cloud forensic investigations using Amazon Web Services as a case study example.

Aug 26,2022

19 min read

KAAN KAYA Course

Windows Forensics (W55)

At the end of the training, the participants will be able to reach the level of knowledge to examine devices with Windows operating systems for the purpose of detecting suspicious activity. The course will focus on Windows 10 Operating System, but we know that there are a lot of common things with server operating systems. So Windows Server systems also could be our evidence source. The course’s material will also apply to Windows 11, as there are no changes compared to Windows 10 when looking from a forensics perspective. 

Jan 05,2022

10 min read

Natural Language Processing for OSINT & Threat Analysis (W54)

In this course, we apply Natural Language Processing to cyber threat analysis and OSINT, to assess and analyze data gained …

Aug 28,2021

7 min read

© HAKIN9 MEDIA SP. Z O.O. SP. K. 2013