OPERATIONAL LEVEL OF DEFENSE
by Filip Nowak Security operations is subject to constraints, limitations and constant task reprioritization. This is especially true when developing Security …
Read MoreeForensics Weekly newsletter - What's HOT in Digital Forensics 15th of October 2014
eForensics Magazine Weekly What's HOT in Digital Forensics 15th of October 2014 New Forensics Tools CAINE 6.0 (the "Computer Aided Investigative …
Read MoreTwo Real Network Forensics Analysis FORENSICS ANALYSIS RELATED WITH THE ATTACKS TO PHP.NET AND THE BOSTON BOMBS.
We could say that we live an era where the signature-based Antivirus has less sense if we want to fight …
Read MoreCybercrime and Cybersecurity – The Legal and Regulatory Environment
Cybercrime and Cybersecurity – The Legal and Regulatory Environment By Colin Renouf What we will learn In this article we …
Read MoreTowards a Secure Next Generation PPDR Communication: SALUS Approach
Abstract— A secure communication network that is backward compatible with legacy communication and new 4G technologies that supports reliable and …
Read MoreUnderstanding SIM Card Forensics
The SIM (subscriber identity module) is a fundamental component of cellular phones. It’s also known as an integrated circuit card …
Read MoreDecreasing Incident Response Time...
Seems like security incidents are occurring more often with mild to significant impact on consumers and various organizations, e.g. JP …
Read MoreAre 2 factor authentications enough to protect your money?
ABSTRACT During last few years banks, and different financial institutions, have been trying to protect or prevent fraud and cyber-attacks …
Read MoreAn Overview of Cloud Forensics
By: Dejan Lukan When discussing cloud forensics, we’re actually talking about the intersection between cloud computing and network forensic …
Read MoreBiometric Facial Recognition Database Systems
by Robert E. Vanaman For millenniums, humans have availed themselves of the body characteristics of one another such as face, speech, …
Read More