Tag: malware
Don’t Just Scan That QR Code: An Ethical Hacker’s ...
Rupali Shukla Aug 30, 2025 0 73
In the world we live in, convenience is paramount. Do you want to settle your bill? Take a look at the QR code. Do you want to ...
Malware Forensics: Dissecting Modern Ransomware & ...
DEEPAK YADAV Aug 25, 2025 0 80
Malware forensics is the study of harmful software to determine how it functions, how it got into a system, and what harm it did. ...
2.3 Million Users Infected by Malicious Chrome & E...
DEEPAK YADAV Jul 10, 2025 0 104
For years at a time, 18 extensions had a "squeaky clean" codebase until a version bump made them into malicious trojans without an...
How to Avoid Malicious APKs on Your Android Phone?
Shashank dave Apr 30, 2025 0 442
Android apps install via APK files, but some “malicious APKs” hide dangerous software that can steal your data, spy on you, or eve...
WhatsApp Wedding Card Downloads Can Delete Your Da...
preeti Nov 12, 2024 0 207
Beware of downloading wedding cards from WhatsApp this season. Some digital wedding invitations contain malicious links or attachm...
Popular Posts
-
Amroha Police Cyber Security Internship Program - 2025
DEEPAK YADAV May 20, 2025 1 3693
-
Whatsapp Helpline: Guide to Reporting WhatsApp’s Griev...
Rupali Shukla Jul 14, 2025 9 3157
-
Cyber Security Summer Internship Gurugram Police 2025 1...
DEEPAK YADAV May 1, 2025 0 2351
-
Instagram helpline : A Complete Guide to Instagram Comp...
DEEPAK YADAV Jul 13, 2025 1 2295
-
Helpline for Cybercrime: How Can I Report Cybercrime in...
DEEPAK YADAV Nov 5, 2024 1 2272
Our Picks
-
State/UT Nodal Officer and Grievance Officer contact de...
DEEPAK YADAV Aug 21, 2025 1 352
-
Case 1 - Cheap stuff
Rupali Shukla Aug 5, 2025 0 92
-
Bank Account Unfreeze : Application for Reactivating Fr...
Rupali Shukla Jul 21, 2025 1 1512
-
Fraud through ITR refund verification mail
Mahendra Sonawane Jul 20, 2025 0 96
-
Digital Forensic Acquisition — A Deep Dive
Rupali Shukla Jul 17, 2025 0 204
Categories
- Cyber Crime(80)
- Help Line(15)
- Seminars(2)
- Case Study(13)
- Trending Crime(15)
- Nodal Officer(1)
- News(177)
- Cyber News(142)
- Technology News(9)
- Latest Updates(25)
- Podcast(9)
- Blog(89)
Random Posts
Voting Poll
What is a hash function used for in digital forensics?
Total Vote: 3
Encrypting files
What does ‘write blocker’ do in forensics?
Total Vote: 4
Allows writing on drives
The most common method for identifying a person is:
Total Vote: 5
Blood type
Which of the following is an example of physical evidence?
Total Vote: 7
A confession letter
What is chain of custody?
Total Vote: 8
A prisoner's handcuff
Who is considered the "Father of Forensic Science"?
Total Vote: 6
Sir Arthur Conan Doyle
Which of these is a sign of a secure website?
Total Vote: 7
The page loads fast
What is 2FA (Two-Factor Authentication)?
Total Vote: 5
Logging in with two devices
What is the most important first step when collecting digital evidence from a suspect’s device?
Total Vote: 5
Turn off the device to preserve battery life
What is phishing?
Total Vote: 6
A method to catch fish online