Quantcast
Channel: Computer Forensics and Information Security
Browsing all 7 articles
Browse latest View live

Computer Forensics: Hiding Data Part 1

Hiding data is far from new and has existed before computers made it so easy to hide data.  It is not in the exclusive domain of a computer forensics expert.  In fact, people, businesses, and...

View Article



Image may be NSFW.
Clik here to view.

Twitter Malware: "It's you on photo?"

Twitter link malware:By AVM Technology, LLC a computer security and computer forensics company based in Richmond, VAHackers are now spreading malware through Twitter. It makes perfect sense, many...

View Article

Image may be NSFW.
Clik here to view.

An Algorithm To Track Malware (And More)

Most organizations utilize intrusion detection systems (IDS) to monitor network or system activities for malicious network traffic. Once an intrusion is detected, some systems may attempt to stop it,...

View Article

So Pacemakers Can Be Hacked... How?

It has been reported that pacemakers can be hacked. This was not the first report of this kind. Back in 2008, researchers from the University of Washington and the University of Massachusetts wrote a...

View Article

Image may be NSFW.
Clik here to view.

Android Malware Continues

Android has become well known for malware propagation.  Its wide adoption and open ecosystem make it an attractive target for attackers.  We have previously written about Android apps from the Google...

View Article


Image may be NSFW.
Clik here to view.

vSkimmer - A Trojan That Steals Credit Card Info From POS Terminals

We have a new addition to the long list of trojans that target financial transactions.  This one is called vSkimmer and it targets credit card payment terminals that use the Windows operating system....

View Article

Image may be NSFW.
Clik here to view.

Ransomware: The FBI is Not Really Charging You a Fine to Unlock Your Computer

What is Ransomware?Ransomware is a type of malware.  Unlike other forms of malware, the purpose of ransomware is not to steal information from the system or to use the system's resources as part of a...

View Article
Browsing all 7 articles
Browse latest View live




Latest Images