This is a quick look at the recently revealed “activities” API within Office 365. This undocumented interface provides investigators with a wealth of detailed information that was previously believed to be unavailable. It appears to work with all Office 365 enterprise plans, and requires no action to enable.
-
Find out what happened during a ransomware attack on computer
Introduction The encryption pandemic has swept the world. No commercial companies or gover… -
Analyzing videos with multiple video streams in digital forensics
In this article, we will review a special case of video files: files with multiple video s… -
PC3000 Portable III in Digital Forensics
Introduction Sooner or later, most forensics experts have to deal with damaged hard drives…
Load More Related Articles
-
-
The Five Most Dangerous New Attack Techniques and How to Counter Them
Which are the most dangerous new attack techniques? How do they work? How can you stop the… -
Visual Analysis with ProcDOT
In the new episode of “Introduction to Malware Analysis” series Richard Davis …
Load More In Videos
Comments are closed.