Blog

Latest news around the world

03

Nov'14

OPERATIONAL LEVEL OF DEFENSE

by Filip Nowak Security operations is subject to constraints, limitations and constant task reprioritization. This is especially true when developing Security …

Read More

23

Oct'14

eForensics Weekly newsletter - What's HOT in Digital Forensics 15th of October 2014

eForensics Magazine Weekly What's HOT in Digital Forensics 15th of October 2014 New Forensics Tools CAINE 6.0 (the "Computer Aided Investigative …

Read More

15

Oct'14

Two Real Network Forensics Analysis FORENSICS ANALYSIS RELATED WITH THE ATTACKS TO PHP.NET AND THE BOSTON BOMBS.

We could say that we live an era where the signature-based Antivirus has less sense if we want to fight …

Read More

13

Oct'14

Cybercrime and Cybersecurity – The Legal and Regulatory Environment

Cybercrime and Cybersecurity – The Legal and Regulatory Environment By Colin Renouf What we will learn In this article we …

Read More

10

Oct'14

Towards a Secure Next Generation PPDR Communication: SALUS Approach

Abstract— A secure communication network that is backward compatible with legacy communication and new 4G technologies that supports reliable and …

Read More

08

Oct'14

Understanding SIM Card Forensics

The SIM (subscriber identity module) is a fundamental component of cellular phones. It’s also known as an integrated circuit card …

Read More

02

Oct'14

Decreasing Incident Response Time...

Seems like security incidents are occurring more often with mild to significant impact on consumers and various organizations, e.g. JP …

Read More

25

Sep'14

Are 2 factor authentications enough to protect your money?

ABSTRACT During last few years banks, and different financial institutions, have been trying to protect or prevent fraud and cyber-attacks …

Read More

18

Sep'14

An Overview of Cloud Forensics

By: Dejan Lukan   When discussing cloud forensics, we’re actually talking about the intersection between cloud computing and network forensic …

Read More

16

May'14

Biometric Facial Recognition Database Systems

by Robert E. Vanaman  For millenniums, humans have availed themselves of the body characteristics of one another such as face, speech, …

Read More
© HAKIN9 MEDIA SP. Z O.O. SP. K. 2013