As a global society, in both developed communities and those residents in the less wealthy regions, we have evolved varying levels of dependencies on technology to support and administer both our sociological and professional lifestyles. It may also be that, to a large extent, such dependencies are unseen, taken for....
Author
Latest Articles
- BlogApril 7, 2022Detecting Fake Images via Noise Analysis | Forensics Tutorial [FREE COURSE CONTENT]
- BlogMarch 2, 2022Windows File System | Windows Forensics Tutorial [FREE COURSE CONTENT]
- BlogAugust 17, 2021PowerShell in forensics - suitable cases [FREE COURSE CONTENT]
- OpenMay 20, 2021Photographic Evidence and Photographic Evidence Tampering
Great topic. I agree we will continue to deny the existence of sophisticated cyber crimes.l read an article how digital certificates stolen from Foxcomm and were used by unknown government sources to listen in on sensitive government discussions. I could continue to state other examples but your article is honest.
Thanks for sharing your opinion Ray.
Would it be possible for you to share a link to the article you mentioned as well? We could start a little list of cases confirming the observations and predictions we’ve just read in the article above :).