Transferring Backdoor Payloads with BMP Image Pixels | By Damon Mohammadbagher
Transferring Backdoor Payloads with BMP Image Pixels In this article, I want to talk about BMP files and how you …
Read MoreCybersecurity: “The First Step Is to Know Where You Stand” - Interview with Doug Clare, VP for cyber security solutions at FICO
Today we would like to invite you to read our interview with Doug Clare, VP for cyber security solutions at FICO. …
Read MoreWired Security - discount for eForensics readers!
WIRED Security (20 October 2016) is a new one-day event, which will gather more than 20 industry-leading Main Stage speakers, plus an …
Read MoreCyberconfusion: Cyber Security, Cyber-Security or Cybersecurity? by Dr. Shem
Picture: Daily Tech So which is it: Cyber Security, Cyber-Security or Cybersecurity? Is this the next reincarnation of datacentre vs. …
Read MoreThrowing Down The Cyber Security Gauntlet by Stuart Peck
“George Osborne recently announced that he plans to invest £1.9 billion in Cyber Security (which will increase the government's spending to a …
Read More5 Security Awareness Tips to Keep You Safe by Daniel Brecht
Source of the image: Inter State Security Corp Are you worried about cyber security? Everyone, from home users and small businesses …
Read MoreThe Three Lenses of a Cyber Economist by Sheldon Shaw
The cyber economist views the IT security landscape through three lenses; societal, intellectual and technical. At once these collide and …
Read MoreAll along the cyber attack continuum - Detecting cyberattacks earlier, by Sheldon Shaw from SAS
Many organizations use analytics as an integral part of their businesses operations — to proactively uncover hidden meaning behind customer …
Read MoreTackling the Challenges of a Mobile, Digitally-Driven World with Advanced Mobile Device Forensics
Five Emerging Challenges in Mobile Device Forensics Law enforcement agencies and enterprises are struggling with too many devices, too many …
Read More