It took me a while – the game was released in late 2016 – but I’ve finally finished Watch Dogs 2. After playing the first game, I was pleasantly surprised at how well the sequel adapts hacking for entertaining gameplay while giving a nod to the real-life scene.
Tech support scams – which attempt to extort money from vulerable people by exploiting their lack of technical knowledge – are difficult to stop, but I recently discovered a Twitch streamer working to raise awareness of the threat.
After extracting data from Google Chrome last month, next on our journey into the eye-opening world of Windows forensics it’s time to retrieve the user’s Firefox history to see which websites they’ve been visiting in Mozilla’s browser.
When investigating a potentially compromised Windows computer, as well as looking at logs, files, and processes, it’s important to check its current network connections. Here’s how to retrieve that data with
netstat and make sense of it.
Formula 1 technical director and former Brawn GP team principal Ross Brawn gives his perspectives on strategy and decision making in his book Total Competition – and there are more parallels with cyber security than you might think.