Category Archives: Digital Forensics

Security BSides Athens 2016, Greece

I am pleased to announce that the Information Security Research Group is a proud community supporter of the effort being put into organising the Security BSides Athens 2016 in Greece held on the Saturday, 25 June 2016. More information about the event can be found … Continue reading

Posted in Computer Systems Security, Digital Forensics, Network Security, News Articles | Tagged , | Leave a comment

iPad and iTunes file recovery of Smart Recorder Files

This solution is only for Mac’s. Use the following information at your own risk. If you have an iPad (I would imagine it is the same for iPhones) and you have recorded something with Smart Recorder (or Smart Recorder Lite) and … Continue reading

Posted in Digital Forensics, Mobile Phones, PDA Forensics | 6 Comments

Decaf COFEE put me to sleep

Decaf[1] is the hackers reply to Microsoft’s COFEE tool set. Once again creating a tool to combat a set of tools as old as Sysinternals is nothing new or surprising. If it did not happen we would have been surprised. … Continue reading

Posted in Digital Forensics | 3 Comments

MS COFEE for live comp. forensics

It is all about the COFEE [1] that will keep you awake. In this case, ahead of the game. Microsoft’s COFEE (Computer Online Forensics Evidence Extractor) [1] is out and about, making the rounds on the Internet underground (and overground, … Continue reading

Posted in Digital Forensics, Mobile Phones, PDA Forensics | Leave a comment

iPhone: myPhone on lock-down

…and you thought you were the only person to have the privilege of locking your iPhones screen. Think again. Once again a stunt and proof of concept demonstrates that high tech. mobile devices can be manipulated and possibly locked down … Continue reading

Posted in Digital Forensics, Mobile Phones, PDA Forensics | 5 Comments

Phone tapping the VoIP way

VoIP stands for Voice over IP (or the Internet). It is a cheap (or free) way of contacting people around the world. The most commonly used online application is Skype. When I came across this article [http://www.theregister.co.uk/2009/08/28/skype_trojan_source_code/] I had to … Continue reading

Posted in Digital Forensics, Mobile Phones, PDA Forensics | 3 Comments