In the last hours, the vulnerabilities of the CPU have had a great prominence even in the non-specialized press. So, I think that would be useful trying to summarize the situation in a simple way.
Keyloggers are often used by malicious softwares to steal sensitive data and login credentials. During a malware analysis process is useful to know how a keylogger works.
My running year recap. Ok, 2018 is near to ends, now is time to make some statistics on my running activity.
In digital forensics, the term logical extraction is typically used to refer to extractions that do not recover deleted data, or do not include a full bit-by-bit copy of the evidence, analogously to copying and pasting a folder in order to extract data from a system. So, this process will …