Artifacts that attackers can collect from you
Attackers can collect artifacts from you in many ways. Traditionally, artifacts were used by cyber-forensic professionals to trace back perpetrators after an attack. In today’s modern world, artifacts are quite useful to collect information about targeted users or companies to understand their behavior patterns, buying patterns from online stores, interests, and other exciting information. Artifacts can be collected by attackers on any device including desktops, laptops, or mobile devices. They can be collected from deep inside the operating system, memory, temporary files, and various locations inside the filesystem. Artifacts can provide significant information about the activities performed by cyber attackers, as well as users. This is the reason why artifacts are the main source of evidence for cyber-forensic professionals when analyzing an attack. For forensic professionals, artifacts provide information related to unauthorized...