Computer Forensics: Hiding Data Part 1
Hiding data is far from new and has existed before computers made it so easy to hide data. It is not in the exclusive domain of a computer forensics expert. In fact, people, businesses, and...
View ArticleTwitter Malware: "It's you on photo?"
Twitter link malware:By AVM Technology, LLC a computer security and computer forensics company based in Richmond, VAHackers are now spreading malware through Twitter. It makes perfect sense, many...
View ArticleAn Algorithm To Track Malware (And More)
Most organizations utilize intrusion detection systems (IDS) to monitor network or system activities for malicious network traffic. Once an intrusion is detected, some systems may attempt to stop it,...
View ArticleSo Pacemakers Can Be Hacked... How?
It has been reported that pacemakers can be hacked. This was not the first report of this kind. Back in 2008, researchers from the University of Washington and the University of Massachusetts wrote a...
View ArticleAndroid Malware Continues
Android has become well known for malware propagation. Its wide adoption and open ecosystem make it an attractive target for attackers. We have previously written about Android apps from the Google...
View ArticlevSkimmer - A Trojan That Steals Credit Card Info From POS Terminals
We have a new addition to the long list of trojans that target financial transactions. This one is called vSkimmer and it targets credit card payment terminals that use the Windows operating system....
View ArticleRansomware: The FBI is Not Really Charging You a Fine to Unlock Your Computer
What is Ransomware?Ransomware is a type of malware. Unlike other forms of malware, the purpose of ransomware is not to steal information from the system or to use the system's resources as part of a...
View Article
More Pages to Explore .....