Forensics in Business Continuity Planning

Business continuity planning in any organization today must incorporate aspects of computer forensics in order to be sustainable. According to Majore, Yoo & Shon (2014) in their article on secure and reliable electronic record management, over 90% of records created today are electronic. In addition to this electronic records require a greater amount of maintenance due to their volatility and dependence on reliable hardware and software. In continuity planning, organizations must face these challenges head on and prepare strategies that integrate digital forensics disciplines into their underlying processes. ...

November 16, 2017 · 2 min · 243 words · icarnaghan

What is the Role of Computer Forensics?

Computer forensics can play a vital role in an organization’s recovery from a cyber attack. By properly following forensics processes carefully in the aftermath of an attack, recovery can begin to play out. According to Čisar & Maravić Čisar (2012), in accordance with digital forensic analysis methodology three processes are essential, which include preparation, identification, and analysis. It is during these processes that a post-mortem analysis occurs including file system, event logs, and recovery of deleted files. ...

November 16, 2017 · 2 min · 219 words · icarnaghan

A2 Hosting review: Is it the fastest shared hosting service?

A2 is one of the top 10 hosting companies in the world. The company has been operating since 2001/2002 and it has launched several hosting plans for every budget. As of today, over 10K sites are hosted on A2 servers. A2 offers cloud, VPS, dedicated and shared hosting service. Is it a reliable hosting firm? Are its plans affordable? Is its support staff customer friendly? Let’s find it out! ...

November 15, 2017 · 5 min · 993 words · prhost78

Monstroid2 review: A great multipurpose WordPress bootstrap theme

Monstroid2 is a premium multipurpose WordPress theme powered by Twitter Bootstrap and Cherry Framework, a secure modular open-source framework for developing themes and plugins. It is the successor to the Monstroid theme which had become a talk of the town within few months of its launch. Monstroid2 has new and powerful features. It also includes a powerful live theme customizer and page builder tool. The theme has been developed by a firm called Jetimpex. Like StudioPress, Elegant Themes, Jetimpex is one of the top WP development companies. JI has launched 100+ templates for WordPress, Joomla, Prestashop on TemplateMonster, a marketplace for webmasters and developers. It has also published several plain HTML templates. Monstroid is Jetimpex’s best-selling WP theme. ...

November 11, 2017 · 4 min · 850 words · prhost78

Malicious Code Detection

Malicious code detection is an ongoing obfuscation-deobfuscation game because of the nature of the malware or goals of the attacker. Detection of malicious executables known to an investigator is usually performed using signature-based techniques. In their forensic research article, Rozenberg, Guides, Elovici and Fledel (2010) made the point that obfuscated or encrypted files could not easily be detected this way. Instead they recommended a behavioral approach to real time detection. As hackers continue to find new and more advanced techniques to encrypt and hide malicious code, security personnel will have to continue to upgrade their skills and toolsets used in investigations, resulting in an ongoing obfuscation-deobfuscation game. ...

October 27, 2017 · 2 min · 309 words · icarnaghan

Remote Access Trojans

Remote Access Trojans have become a serious security concern as hackers have developed more sophisticated code that can be installed and hidden on a target system, unknown to the user. According to UMUC (n.d.) Remote Access Trojans are a form of backdoor that can provide unauthorized access and use of digital assets on a victim’s computer system. It essentially masquerades as a legitimate application. They allow hackers to perform a number of malicious tasks such as stealing information from a system, or installing other malicious software. ...

October 27, 2017 · 2 min · 273 words · icarnaghan

How to increase traffic to blog for free?

Starting a new blog is easy but making it popular is difficult. People find blogging as one of the easiest ways to make money online. Well, making money through a blog is not a piece of cake. Only websites getting decent traffic generate revenue for their owners. A successful blogger is one who earns enough money only to feed his family and pay internet and web hosting bills. Frankly speaking, the website’s fate depends on the traffic. If a site is getting traffic, it will make money for the owner. If it hardly gets visitors, it is of no use to the owner. ...

October 24, 2017 · 5 min · 941 words · prhost78

Presenting Digital Evidence

Testifying and writing a report are both essential ingredients to a successful digital forensics investigation. Digital forensics personnel will potentially spend months of time working with complex data and processes. The delivery and result of this work is reflected in the forensics report and then ultimately testified in court. Cohen (2012) discussed the report as integral to the overall investigation. Evidence, analysis, interpretation, and attribution, must ultimately be presented in the form of expert reports, depositions, and testimony. The report will present the data captured during the investigation in a way that can be communicated with other people. In addition to this, it serves as a living record that will be referenced and updated throughout the investigation. ...

October 14, 2017 · 2 min · 288 words · icarnaghan

Confusion over Terminology

The terms risk, vulnerability and threat are often confusing and sometime interchangeable leading to a lack of understanding when presenting evidence. Risks are usually based on a probability that a threat of some kind will exploit a vulnerability or weakness in a system or network. In recent years risks have been taken more seriously with many businesses that conduct online activities. Vulnerabilities as mentioned above are typically weaknesses that can be exploited by an attacker. This can include anything from poorly configured software and firewalls to badly written pieces of code that can affect secrecy, integrity and control of data and functionality within a system. Bergeron et al. (2001). ...

October 12, 2017 · 2 min · 254 words · icarnaghan

How to test WordPress plugins online without installing?

If your site is getting good traffic, and if a new version of the plugin you’re using has been launched, you’ll have the following two questions in the mind: Will the plugin break your site? Is the plugin worth installing? Even though the plugins are thoroughly tested before launch, it may have some bugs. If you install the update, your site may crash or it may add HTML code which may affect your site’s ranking in Google or Bing. ...

October 12, 2017 · 2 min · 389 words · prhost78