Yet More Theft of Information Assets

It doesn’t seem that long ago that I received an official letter in the mail from the United States...

Sep 19 · 1 min read >
Theft of Information Assets

Important Cybercrime Laws

There are a number of cybercrime laws that are extremely important in the field of digital forensics and cybersecurity...

Sep 19 · 1 min read >
important cybercrime laws

DNS Rebinding and Intrusion Detection with Contextual Signatures

This article summarizes and analyzes discussion from two different articles on the subjects of DNS Rebinding and the use of...

Feb 2 · 8 min read >
dns rebinding

Mitigating DoS or Distributed DoS (DDoS) attacks

Denial of Service (Dos) and Distributed Denial of Service (DDoS) attacks have continued to prove to be one of...

Jan 16 · 9 min read >
denial of service

Common Bluetooth Vulnerabilities to be Aware of

Bluetooth connectivity has grown immensely in popularity with mobile devices in the last number of years. The convenience factor...

Nov 23 · 1 min read >
common bluetooth vulnerabilities

Mobile Considerations in Network Security Architecture

The use of mobile devices including policies and employee restrictions should be considered in any modern network security architecture....

Nov 19 · 1 min read >
mobile network security

What are Covert Channels?

A covert storage channel occurs when illegitimate hidden information or data is sent secretly via a legitimate communication channel....

Nov 5 · 1 min read >
covert channels

Modern Application Frameworks, Legacy Browsers and Security Implications

I was recently sent an article titled ‘How it feels to learn JavaScript in 2016’. Aguinaga, J. (2016).  It...

Nov 3 · 1 min read >
application frameworks security

Two Common Router Security Threats

Syn Flood or Denial of Service Attack Syn Flood attacks, often referred to as Denial of Service Attacks are...

Oct 11 · 1 min read >
router security threats