Streaming issues? Report here
Africa Melane 2019 1500 BW Africa Melane 2019 1500 BW
Early Breakfast with Africa Melane
04:00 - 06:00
volume_up
volume_mute

Up Next: Good Morning Cape Town with Lester Kiewit
See full line-up
Early Breakfast with Africa Melane
04:00 - 06:00
Home
arrow_forward
Politics

How do you trace email threats? A digital forensic expert explains how it's done

18 June 2018 2:31 PM
Tags:
Cyber crime
email threats

Danny Myburgh, MD of Cyanare Forensic Computer Lab, details the industry practices used to trace the origins of sketchy emails.

Cyberbullying, cybercrime and online harassment have become increasingly important problems.

READ: Phishing biggest cyber threat to SA - CSIR

A Cape Town company based in Paarden Eiland recently received a death threat that was sent via email - warning of a bomb allegedly planted in their building.

While it is often very difficult to uncover cybercrime, law enforcement agents and investigators have techniques to track online threats and attacks back to the sender.

Forensic expert Danny explains that email headers - a portion of the email that a normal user can't see - are used to trace the source of email threats.

Myburgh is the Managing Director at Cyanare Forensic Computer Lab which specialises in digital forensic investigations and data fraud analysis.

Once the experts backtrack the email header, they can locate the IP address from which the email was sent.

The IP address is the cyber address for every device, he explains.

If we look at emails in general, what we use in the industry to trace an email is the header information.

Danny Myburgh, Managing Director at Cyanare Forensic Computer Lab

Its a portion of the email that a normal user cant see and it basically gives you the route which that email took to be delivered from the sender to the receiver.

Danny Myburgh, Managing Director at Cyanare Forensic Computer Lab

Listen below to the detailed explanation:




18 June 2018 2:31 PM
Tags:
Cyber crime
email threats

More from Politics