The rise of attacks that use file-less malware and other anti-forensics measures is creating a greater-than-ever skills gap in the cybersecurity industry. Increasingly, bad actors are using techniques ...
The online advertising world continues to be challenged by ne’er-do-wells as Click Forensics released results from its latest quarterly, deep-dive into the company’s fraud detection data. The Company ...
This book is a "first look" at the Malware Forensics Field Guide for Linux Systems, exhibiting the first steps in investigating Linux-based incidents. The Syngress Digital Forensics Field Guides ...
At the end of September at Virus Bulletin 2012 my colleague Eugene Rodionov and I presented the results of our research Defeating anti-forensics in contemporary complex threats, dealing with hidden ...
According to Gartner, enterprises spend just over $10 billion on prevention and detection methods such as anti-virus software, firewalls and detection intrusion systems. Yet, enterprises are fighting ...
ESET malware researchers Peter Kálnai and Michal Poslušný were awarded 3 rd place in this year's Volatility Plugin Contest for their Browserhooks tool. The duo made use of the knowledge they have ...
In 2015, the U.S. Office of Personnel Management revealed that two major breaches affecting at least 22 million people had occurred the previous year, in which the assailants made off with personnel ...
Security vendor Trusteer’s latest product will allow banks to remotely investigate their customers’ computers if it is suspected the PC has been hacked. The service, called Flashlight, is designed to ...
The latest threat to intellectual property comes in the shape of malicious software that is capable of infecting a computer, hiding itself until the user accesses specific files or Web sites — in ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results