you can view the presentation here showing you how Cybercrooks are making money from malware.
Redline is a nice tool to investigate a particular host for signs of compromises. It works on Windows and is freely available on the FireEye site . At a glance, we have options to collect data from the host or Analyse an existing data collected file. In our case , I am going to create Continue reading “A look at Redline from Mandiant”
The digital forensics is the acquisition of digital evidence from many sources such as Laptop, PC, digital cameras, mobile phones ,Routers… USB and SSD cards. The first step is to make a clear picture of the object. The pictures must contain elements such a serial numbers, damaged areas. Then unscrew the device to take theContinue reading “Basics of Digital forensics Procedure”
We welcome this month October in the security community, as the cybersecurity awareness month. There will be different topics everyday for cybersecurity awareness activities. Phishing is the action of getting sensitive information from the victim without using force. Test yourself on how to recognise fake emails from legitimate ones by taking one of these test:Continue reading “Cybersecurity Awareness Month”
Wireless networks are an easy way to connect our laptop, tablet or phone to the internet. Instead of using the traditional RJ45 cabling , the devices just needs to have a wireless card. There are three main types of encryption in wireless network: Wired Equivalent Privacy(WEP) which is available in 64-bit and 128-bit . ItContinue reading “WIRELESS ENCRYPTION”
I found this collection of link to help in skills update. Either as a programmer, a game enthousiast or a hacker. Hackertainment provides more resources to use on our spear time. ToolsWatch has published the best security tools of the year 2014. My best security tool is Nmap. What is yours?.
These sites can give you indications when analysing malicious files . If you are a target of an APT and care about the privacy of your organisation’s information, then do not upload the file, instead use the hash. AVcaesar Jotti Metascan Online VirSCAN
The computers of the IAEA have been infected by a malware.The nuclear agency holds sensitive information from many European states and is an active actor in the fight against Nuclear weapons. It appears that the malicious software once installed was able to transfer information from USB drive of any visitors to the office in Vienna.Continue reading “International Atomic Energy Agency hits by an unknown malware”
Microsoft Digital crime unit has introduced a cloud based technology to help organizations worldwide to fight against malware. It is a technology called Windows Azure-based Cyber Threat Intelligence Program (C-TIP) that will allow the interested parties to share information on real time. But Microsoft advises to use the Malicious Software Removal Tool to clean infectedContinue reading “Fighting Cybercrime”
ZMap is a security tool able to scan the entire internet in matter of second. Contrary to Nmap that looks for multiple port on an range of IP address, ZMap on the inverse searches for the entire IPV4 address on a single port. For those Interested, the tool is here Continue reading “ZMap is out!!!”