How do you trace email threats? A digital forensic expert explains how it's done
Cyberbullying, cybercrime and online harassment have become increasingly important problems.
A Cape Town company based in Paarden Eiland recently received a death threat that was sent via email - warning of a bomb allegedly planted in their building.
While it is often very difficult to uncover cybercrime, law enforcement agents and investigators have techniques to track online threats and attacks back to the sender.
Forensic expert Danny explains that email headers - a portion of the email that a normal user can't see - are used to trace the source of email threats.
Myburgh is the Managing Director at Cyanare Forensic Computer Lab which specialises in digital forensic investigations and data fraud analysis.
Once the experts backtrack the email header, they can locate the IP address from which the email was sent.
The IP address is the cyber address for every device, he explains.
If we look at emails in general, what we use in the industry to trace an email is the header information.Danny Myburgh, Managing Director at Cyanare Forensic Computer Lab
Its a portion of the email that a normal user cant see and it basically gives you the route which that email took to be delivered from the sender to the receiver.Danny Myburgh, Managing Director at Cyanare Forensic Computer Lab
Listen below to the detailed explanation:
Source : EWN
Mkhwebane didn't have kind words for her successor, Kholeka Gcaleka for her role in Ramaphosa’s Phala Phala saga, criticised the NPA’s handling of state capture cases, and accused the SIU of duplicating the work of the Public Protector’s Office.Read More