Future of Digital Forensics

As the use of digital technology continues to expand and evolve, the future of digital forensics looks bright. Here are a few trends to watch out for:Increased reliance on artificial intelligence and machine learning: Digital forensics practitioners are likely to increasingly rely on AI and machine learning to speed up...

Read more...

What is Cyber Forensics?

Cyber forensics, also known as computer forensics or digital forensics, is the process of using scientific techniques and tools to examine digital devices and media in order to identify, preserve, and analyze evidence that can be used in a court of law. It is an essential tool for the investigation...

Read more...

What is Digital Forensics?

Digital forensics is the process of using scientific techniques and tools to examine digital devices and media in order to identify, preserve, and analyze evidence that can be used in a court of law. It is an essential tool for the investigation of cybercrimes, such as data breaches and identity...

Read more...

New Zeus Variant for Sale on the Black Market

The 0Day marketplace was a busy beaver this weekend. I’ve been waiting and watching Sphinx for the past 10 days to see if the 0Day admin would verify this new threat: sphinx New Zeus Variant On Sunday evening, Sphinx, a new variant of the Zeus banking trojan was admin-verified. Sphinx is coded in...

Read more...

Android’s Sandbox

Android's foundation of Linux brings with it a well-understood heritage of Unix-like process isolation and the principle of least privilege. Specifically, the concept that processes running as separate users cannot interfere with each other, such as sending signals or accessing one another’s memory space. Ergo, much of Android’s sandbox is...

Read more...

Computer Ethics

Definition Computer Ethics is a part of practical philosophy which deals with how computing professionals should make decisions regarding professional and social conduct. Computer ethics deals with the procedures, values and practices that govern the process of consuming computing technology and its related disciplines without damaging or violating the moral values and...

Read more...

What is Digital Evidence and the Nature of Digital Evidence

Digital evidence or electronic evidence is “any probative information stored or transmitted in digital form that a party to a court case may use at trial”. Section 79A of IT (Amendment) Act, 2008 defines electronic form evidence as “any information of probative value that is either stored or transmitted in...

Read more...

Crimes in which computer systems are used as tools/instruments

a.Financial fraud (Several sections under IPC, ITAA 2008 and other applicable laws) Financial frauds include business frauds, investment frauds, mass marketing frauds, offering jobs overseas, Nigerian Frauds, business opportunity frauds, etc., where unsuspecting people are lured in trap by the promise of such opportunities and deceived of their money and other valuables. b.Data...

Read more...

Crimes targeting computer systems

a. Hacking (Under Section 66 ITAA 2008) Hacking is a broader term and can be defined as gaining entry into a computer system without the permission, with an intention to cause loss, steal, or destroy the data contained in it. It is often done by people who are well versed with...

Read more...

Types of Cyber Crimes

Cyber crimes cover a wide range of illegal activities, which are either done solely using computer resources (as defined under Section 2 of ITAA, 2008) or, done in conjunction with traditional means using the computer resources and communication devices as tools to commit conventional crimes. The Information Technology (Amendment) Act,...

Read more...