Faliha

47 Results / Page 2 of 6

Background

todayMarch 6, 2026

close

Blog Faliha Khan

Detecting Ransomware Using Machine Learning Techniques

Detecting Ransomware Using Machine Learning Techniques Ransomware has become one of the most damaging cyber threats in the modern digital landscape. Over the past decade, cybercriminals have increasingly used ransomware to disrupt critical infrastructure, businesses, and government institutions. For example, incidents such as the WannaCry attack and the Colonial Pipeline ...

todayMarch 2, 2026

close

Blog Faliha Khan

IoT Forensics: Evidence from Smart Homes & Wearables

IoT Forensics: Evidence from Smart Homes & Wearables The rapid growth of Internet of Things (IoT) technology has changed the way people interact with their surroundings. Smart homes and wearable devices now record daily activities, movements, and interactions in real time. As a result, these devices have become valuable sources ...

todayFebruary 27, 2026

close

Digital Forensics Faliha Khan

Volatile vs Non-Volatile Data in Digital Forensics

Volatile vs Non-Volatile Data in Digital Forensics Understanding the Difference That Can Make or Break an Investigation In digital forensic investigations, evidence is not always stored permanently. Some data exists only briefly and disappears the moment a system is powered off, while other data remains stored for months or even ...

todayFebruary 26, 2026

close

Digital Forensics Faliha Khan

Cyberstalking & Digital Harassment: Forensic Evidence Collection

Cyberstalking & Digital Harassment: Forensic Evidence Collection In today’s digital world, cyberstalking and digital harassment have become serious and increasingly reported cybercrimes. Moreover, the widespread use of smartphones, social media platforms, and instant messaging applications has provided offenders with constant access to their victims. As a result, harassment is no ...

todayFebruary 25, 2026

close

Digital Forensics Faliha Khan

Vanishing Messages That Don’t Really Vanish

Vanishing Messages That Don’t Really Vanish Vanishing messages promise privacy. At first glance, they appear to erase conversations forever after a set time. Because of this feature, millions of users trust disappearing messages for sensitive, personal, or even illegal communications. However, from a digital forensic perspective, these messages rarely vanish ...

todayFebruary 24, 2026

close

Digital Forensics Faliha Khan

Steganography: Hiding Information in Plain Sight

Steganography: Hiding Information in Plain Sight In the world of digital forensics, not all evidence is obvious. While encryption openly protects data by making it unreadable, there exists another, more subtle technique—steganography. Instead of scrambling information, steganography conceals the very existence of the data. As cybercrime evolves, understanding steganography has ...

todayFebruary 23, 2026

close

Digital Forensics Faliha Khan

How Emojis and Stickers Become Digital Evidence

How Emojis and Stickers Become Digital Evidence In today’s digital world, communication has moved far beyond plain text. Emojis, stickers, GIFs, and reaction icons now form an integral part of everyday conversations. While many people view them as casual or harmless expressions, digital forensic investigations often treat emojis and stickers ...

todayFebruary 21, 2026

close

Blog Faliha Khan

Social Media Forensics: Evidence Collection and Legal Issues

Social Media Forensics: Evidence Collection and Legal Issues In today’s digital world, social media platforms have become an integral part of daily life. People use them to communicate, share opinions, upload photos, and conduct business. Consequently, social media now plays a significant role in criminal and civil investigations. As a ...

todayFebruary 19, 2026

close

Digital Forensics Faliha Khan

Types of Digital Evidence Every Forensic Student Must Know

Types of Digital Evidence Every Forensic Student Must Know In the modern digital age, crimes rarely occur without leaving electronic traces. Therefore, digital evidence has become a crucial part of forensic investigations. From mobile phones to cloud storage, digital devices store valuable information that can help investigators reconstruct events. For ...