Hashim Shaikh

Hashim Shaikh currently works with Aujas Networks. Possessing a both OSCP and CEH, he likes exploring Kali Linux. Interests include offensive security, exploitation, privilege escalation and learning new things. His blog can be found here: http://justpentest.blogspot.in and his LinkedIn Profile here: https://in.linkedin.com/in/hashim-shaikh-oscp-45b90a48
Hashim Shaikh

iOS forensics

Day by day, smartphones and tablets are becoming ever more popular, and as a result, the technology used in development to add new features or improve the se

Computer Forensics: Mobile Forensics [Updated 2019]

Is There a Need for Mobile Device Forensics? The use of Mobile devices in criminal investigations and similar activity has been present and widely recognized

The importance of physical security in the workplace

Physical security in detail Protecting important data, confidential information, networks, software, equipment, facilities, company's assets, and personnel

Mobile forensic process: Steps and types

Mobile forensics is a branch of digital forensics related to the recovery of digital evidence from mobile devices. "Forensically sound" is a term used extens

What is Phishing and How to Deal with It?

What is phishing? Phishing is sending fraudulent emails, phone calls or websites by manipulating the unsuspecting users that it is from a reputable company o

The Certified Computer Forensics Examiner (CCFE)

Do You Need Computer Forensics Certification? If you are keen being part of a criminal examination group or working with organizations to examine and recoup

Major Ways of Stealing Sensitive Data

Description: We all are aware that there's an almost infinite number of hackers out there whose absolute goal it to steal and misuse any sensitive data they

Email spoofing and Spams

What is email spoofing? Email spoofing is the technique of sending email to others with a forged sender's address. What is spamming? Spamming is an automate

Cyber – bullying threats, prevention and solutions

Dr. Sameer Hinduja and Dr. Justin Patchin at the Cyberbullying Research Center define cyberbullying as "willful and continuous harm done using any electronic

The concept of mobile phone

The digital forensic community is striving hard to stay abreast of the current state of the art in the constantly changing technologies which we use to expos

Feature Phone Forensics

Introduction A feature phone can be described as a wireless mobile device that has more features than a standard cell phone, but limited capabilities when yo

Practical android phone forensics

Today's world is Android World. Almost 90% of devices are running on Android, and each one of us is using Android in some or the other way. There are various