Cybersecurity

Open “Window” For Personal Data Theft

Another day has come, the sun has risen once more and… the hackers have found once again a new way to snick up to...
thetechverse.net
1 min read

What are Advanced Persistent Threats?

Advanced Persistent Threats (APTs) are security threats that use advanced techniques to hide their attack from their target. They are commonly used to target...
Ian Carnaghan
1 min read

Helpful Resources for Understanding Web Application Security

As a developer, knowledge of web application security vulnerabilities is essential in order to build software that is both resilient to attacks and protected...
Ian Carnaghan
1 min read

Just What Exactly is Cybersecurity Anyway?

The word Cybersecurity is thrown around so much these days it has almost become overused in many conversations. This is due to the vast...
Ian Carnaghan
1 min read

What is an Asymmetric Threat?

The term asymmetric refers to an unequal balance or when thinking about threats, an unfair advantage to the perpetrator. Phillips, A (2012) provided an...
Ian Carnaghan
53 sec read

Business Continuity Analysis

The purpose of business continuity planning is to ensure continued operations of an organization in the event of a catastrophic event, whether this may...
Ian Carnaghan
12 min read

An analysis of different data sources used in a…

This article provides an overview of four different data sources used in various forensics investigations. The first source includes system log files containing system...
Ian Carnaghan
13 min read

Forensics in Business Continuity Planning

Business continuity planning in any organization today must incorporate aspects of computer forensics in order to be sustainable. According to Majore, Yoo & Shon...
Ian Carnaghan
52 sec read

What is the Role of Computer Forensics?

Computer forensics can play a vital role in an organization’s recovery from a cyber attack. By properly following forensics processes carefully in the aftermath...
Ian Carnaghan
48 sec read

Malicious Code Detection

Malicious code detection is an ongoing obfuscation-deobfuscation game because of the nature of the malware or goals of the attacker. Detection of malicious executables...
Ian Carnaghan
1 min read

Remote Access Trojans

Remote Access Trojans have become a serious security concern as hackers have developed more sophisticated code that can be installed and hidden on a...
Ian Carnaghan
1 min read

Presenting Digital Evidence

Testifying and writing a report are both essential ingredients to a successful digital forensics investigation. Digital forensics personnel will potentially spend months of time...
Ian Carnaghan
1 min read