WHAT’S THE DIFFERENCE? The threat level has never been higher for organizations charged with protecting valuable data. In fact, as recent headlines will attest, no company or agency is completely immune to targeted attacks by persistent, skilled adversaries. The unprecedented success of these attacks against large and well-equipped organizations around the world has led manysecurity …


Zero-Click Attacks against Smartphones

The rapid increasing use of smartphones for communications, such as banking and social networking, has made them an attractive target for cyber criminals. These malicious actors used social engineering to lure victims into clicking a malicious link or pressing a button, thereby causing the malware to execute, proliferate and compromise the victim’s smartphone successfully. However, …

Zero-Click Attacks against Smartphones Read More »

How to Investigate Twitter Trends

Trending list on Twitter seems to be a major criterion for the most important topics in circulation. Many journalists use Twitter to make editorial determinations, catering their coverage to what is perceived as popular – and analysis of “semantic similarity” between news reports has even revealed a link between what reporters see on their own …

How to Investigate Twitter Trends Read More »

Phone Extraction | Technical Perspective

General explanation of mobile phone extraction, Mobile Phone Extraction technologies, known also as mobile forensics, entails the physical connection of the mobile device that is to be analysed and a device that extracts, analyses and presents the data contained on the phone. Whilst forensics experts, hackers and those selling spyware may be able to access …

Phone Extraction | Technical Perspective Read More »

How they do Cyber Espionage activity using USB Devices

Initial infection vector to performs cyber espionage activity, currently being tracked as UNC4191, which leverages USB devices as an initial infection vector, and concentrates on the Philippines. These operations have affected various public and private sector entities primarily in Southeast Asia and extending to the U.S., Europe, and the APJ (Asia Pacific and Japan) region. …

How they do Cyber Espionage activity using USB Devices Read More »

Windows Forensics | Last open, Last saved File

Digital Forensic artifacts are that we rely upon. Nowhere is this more true than in the Windows Registry. With no specification and even Microsoft products not following any data storage methodology, it is about as haphazard and irregular as they come. As an example, let’s look at the OpenSaveMRU and LastVisitedMRU Registry keys. Both have …

Windows Forensics | Last open, Last saved File Read More »

error: Content is protected !!