Quantcast
Channel: Network Forensics RSS
Browsing latest articles
Browse All 11 View Live

Google Analytics Cookies and the Forensic Implications

This paper explores how a marketing tool can be used in forensic analysis. It offers an in-depth look at the internal workings of Google Analytics™ cookies, and compares and contrasts them with...

View Article



Cyber Investigations: The Footprints Left Behind

When conducting an online investigation, it’s important to cover your tracks so you don’t tip off the suspect.read more

View Article

Image may be NSFW.
Clik here to view.

Protocol Data Hiding

On Cinco de Mayo in 1997, which happened to be the first Monday in May that year, the Hacker Publication First Monday included an article entitled, “Covert Channels in the TCP Protocol Suite,” by Craig...

View Article

Conducting Anonymous Cyber Investigations

Recently we published the article Cyber Investigations: The Footprints Left Behind, where we described how vital it is to conduct cyber investigations with forethought of what traces you leave behind....

View Article

Image may be NSFW.
Clik here to view.

Book Excerpt: Cyber Fraud: Tactics, Techniques and Procedures

The Evolution of Cyber Fraud Techniques: Phishing and Pharming Phishing and pharming dominated the cyber fraud scene until quite recently, and each remains a formidable threat.read more

View Article


Image may be NSFW.
Clik here to view.

Cloud Forensics as a Service (FraaS)

Digital forensics integrates techniques and methods used to gather and analyze footprints from computer-generated and human activity in a manner that is relevant in a court of law.The Standard Working...

View Article

Dispelling Common Myths of Live Digital Forensics

If your forensic processes preclude the use of evidence recovered through live digital forensics, it’s not the state in which you encountered it that’s at the root of your problem.read more

View Article

The Wild West of Social Media Evidence Collection

Due to inconsistencies in format, data collection from social networking sites and Webmail requires careful attention and adaptability to ensure evidence integrity.When it comes to social media and...

View Article


Mozilla Firefox Forensics

The roots of the Mozilla Firefox browser can be traced back to 1998. Netscape Communications (formerly Netscape Communications Corporation, commonly known as Netscape) created the Mozilla Organization...

View Article


Social Media and the Changing Role of Investigators

Investigative methods when collecting evidence from social media vary substantially from traditional digital forensic techniques creating new legal and procedural challenges.Technology is rapidly...

View Article
Browsing latest articles
Browse All 11 View Live




Latest Images