Please turn on your JavaScript for this page to function normally.
Toolkit cracks encrypted information on iOS 5 devices

ElcomSoft updated the iOS Forensic Toolkit with iOS 5 support for recovering keychain information in iOS 5 devices. Providing near-instant forensic access to encrypted …

Network and security analysis with Trisul

Trisul is a new kind of network monitor that supplements fine grained traffic metering with flows, packets, and alerts. You can carry out any kind of network and security …

Improve payment security in-line with PCI DSS

NNT launched version 5 of its Change Tracker and Log Tracker Enterprise software suite. The software is specifically designed to improve payment security and protect against …

Digital Triage Forensics

Digital Triage Forensics (DTF) is a procedural model for the investigation of digital crime scenes including both traditional crime scenes and the more complex battlefield …

Secure hard drive replication for forensic analysis

Ciphertex Data Security announced its new Ranger-COP family (Ciphertex Optimized Protection), a compact pair of products that combine AES 256-bit hardware-based encryption …

Computer forensics tool reveals past online activity

A group of researchers from Stanford University in California and EADS Defence & Security has recently presented a new, open source tool for the forensic analysis of …

Digital forensics: The inside story

Jelle Niemantsverdriet is the Principal Consultant, Forensics and Investigative Response EMEA, Verizon Business Security Solutions. In this interview he introduces the reader …

Integrated content-aware SIEM and firewall

NitroSecurity and Palo Alto Networks have integrated content-aware SIEM and next-generation firewall technology into a complete enterprise security solution designed to …

Digital Forensics for Legal Professionals

Digital Forensics for Legal Professionals provides you with a guide to digital technology forensics in plain English. In the authors’ years of experience in working with …

Android Forensics: Investigation, Analysis and Mobile Security for Google Android

The open source nature of the platform has not only established a new direction for the industry, but enables a developer or forensic analyst to understand the device at the …

Tracking anomalies from multiple sources across the organization

Zettaset unveiled its new Security Data Warehouse (SDW), which enables users to track up to petabytes of business and security data for anomalies and other potentially …

iOS Forensic Toolkit now with Keychain decryption

ElcomSoft released a major update to its iOS Forensic Toolkit, implementing an all-in-one toolkit for iOS acquisition on both Windows and Mac platforms. Elcomsoft iOS Forensic …

Don't miss

Cybersecurity news