TECHNOLOGY > Forensics

TECHNOLOGY > Forensics Category Archive

« Back to News

New Malware Hides In Memory

by Tim Heath on 2017-03-21 05:55PM in TECHNOLOGY-Forensics, NEWS-News Analysis, FREE TO VIEW, BUSINESS-Services-IT & Telecoms

DNSMessenger: Researchers at the Talos threat research group have published a report on a new form of malware that’s very difficult to detect.

Read Full Story

A Common Language For Sharing Intelligence On Cybersecurity Threats

by Tim Heath on 2017-03-21 11:26AM in TECHNOLOGY-Forensics, NEWS-News Analysis, FREE TO VIEW, BUSINESS-Services-IT & Telecoms

Threat analysts need a more robust framework for characterizing suspicious activity on their endpoints and networks. By Jane Ginn

Read Full Story

Stealthy Malware Is Going Mainstream

by Neil Telford on 2017-02-21 06:59PM in TECHNOLOGY-Forensics, NEWS-News Analysis, FREE TO VIEW, BUSINESS-Services-IT & Telecoms

Fileless malware avoids detection by hiding its payload in secluded spots, like a computer’s RAM or kernel, independent of hard drive files to run on.

Read Full Story

Malware Traders Switch To Less Suspicious File Types

by Neil Telford on 2017-02-15 02:22PM in TECHNOLOGY-Forensics, NEWS-News Analysis, GOVERNMENT-Police, FREE TO VIEW

After aggressively using JavaScript email attachments to distribute malware, attackers are now switching to less suspicious file types.

Read Full Story

Ransomware- Practical Advice To Protect & Recover Using Free Tools

by Tim Heath on 2017-01-31 03:58PM in TECHNOLOGY-Forensics, FREE TO VIEW, BUSINESS-Services-IT & Telecoms

There are concrete strategies & commercial tools available to use to protect yourself against ransomware attacks. By Dinesh Kumar Aggarwal

Read Full Story

Iranian Malware Delivered Via Fake Oxford University Sites

by Neil Telford on 2017-01-24 09:26PM in FREE TO VIEW, NEWS-News Analysis, TECHNOLOGY-Forensics

An Iran-linked advanced persistent threat (APT) group has used fake University of Oxford websites to deliver malware to victims.

Read Full Story

Digital Forensics, Incident Response & Attribution

by Tim Heath on 2017-01-06 03:07PM in NEWS-News Analysis, FREE TO VIEW, TECHNOLOGY-Forensics

The cost of not taking cyber security seriously today is just like the cost of not having your business properly insured.

Read Full Story

Cant Be Bothered: Non-Security Policy Used By 90% Of Workers

by Neil Telford on 2016-11-10 08:52PM in TECHNOLOGY-Forensics, NEWS-News Analysis, FREE TO VIEW

Most workers put convenience ahead of security policies, with 90% of them admitting to ignoring them when they feel they need to.

Read Full Story

DDoS: Deceptive Denial Attacks

by Tim Heath on 2016-10-28 04:33PM in TECHNOLOGY-Forensics, NEWS-News Analysis, FREE TO VIEW

Increasingly sophisticated techniques deployed by attackers using DDOS methods are making the reported size of such attacks redundant.

Read Full Story

The Science of Threat Intelligence

by Neil Telford on 2016-10-17 04:45PM in FREE TO VIEW, NEWS-News Analysis, TECHNOLOGY-Forensics

Threat intelligence is a new technique that helps security organisations recognise attack indicators and target their response fast & accurately.

Read Full Story

Sign Up: Cyber Security Intelligence Newsletter: * indicates required
*