Blog

Latest news around the world

08

Oct'14

Understanding SIM Card Forensics

The SIM (subscriber identity module) is a fundamental component of cellular phones. It’s also known as an integrated circuit card …

Read More

02

Oct'14

Decreasing Incident Response Time...

Seems like security incidents are occurring more often with mild to significant impact on consumers and various organizations, e.g. JP …

Read More

25

Sep'14

Are 2 factor authentications enough to protect your money?

ABSTRACT During last few years banks, and different financial institutions, have been trying to protect or prevent fraud and cyber-attacks …

Read More

18

Sep'14

An Overview of Cloud Forensics

By: Dejan Lukan   When discussing cloud forensics, we’re actually talking about the intersection between cloud computing and network forensic …

Read More

16

May'14

Biometric Facial Recognition Database Systems

by Robert E. Vanaman  For millenniums, humans have availed themselves of the body characteristics of one another such as face, speech, …

Read More

30

Apr'14

Can you hack a modern airliner?

What may have happened to MH370? By Colin Renouf Why read this article With all of the media interest in …

Read More

23

Apr'14

IMPROVING DATABASE APPLICATIONS AND DATABASE INDEX PERFORMANCE

by Robert Vanaman M.B.A., M.S. You can find this article in SQL SERVER COMPENDIUM – FORENSICS ANALYSIS DATABASE APPLICATIONSPERFORMANCE Astonishingly, …

Read More

17

Apr'14

HOW TO INVESTIGATE FILES WITH FTK IMAGER

by Mark Stam   The Master File Table or MFT can be considered one of the most important files in …

Read More

16

Apr'14

CASE STUDY: DESTROYING DATA – IT’S NOT AS EASY AS YOU THINK

by Mark Garnett What you will learn: Forensic imaging techniques MFT file structure MFT file entry recovery How people attempt …

Read More

15

Apr'14

THE EVOLUTIONARY APPROACH TO DEFENSE

by Filip Nowak The evolutionary approach to IT security seems to be the most natural and efficient way to resist …

Read More
© HAKIN9 MEDIA SP. Z O.O. SP. K. 2013