How to Identify Potentially Volatile Data Using Memory Forensics When looking at digital forensics, the data available in our digital assets can be used as strong evidence. A computer’s system may hold critical data in its memory about attacks, like account credentials, encryption keys, emails, internet history, networking connections and....
Author
Latest Articles
- BlogSeptember 29, 2020Using the Google custom search engine for OSINT | By Maciej Makowski
- BlogSeptember 22, 2020Sysmon 12.0 — EventID 24 | By Olaf Hartong
- BlogSeptember 21, 2020Decrypting Databases Using RAM Dump – Health Data | By Michal Rozin
- BlogSeptember 18, 2020TikTok — Using OSINT to Discover New Leads | By Josh Richards
Subscribe
Login
0 Comments