
Cyber-Attacks on Critical Infrastructure of a Country- How do they happen? How should we prevent them?
Introduction “For those on the ramparts of the world’s sole superpower, the digital winds are blowing an icy chill through […]
Introduction “For those on the ramparts of the world’s sole superpower, the digital winds are blowing an icy chill through […]
Introduction Host header injections have been around for a while now, and sometimes the developer just does not know how […]
Few months back, I had the opportunity to conduct two workshops at BSidesDelhi and CSI Mumbai on the above topic. […]
If you are looking to navigate your way through the complexities of Big Data and its use in Security, here […]
Scenario: One of our clients observed a suspicious behavior in a program and wanted us to analyze and identify if […]
What is Data Leakage Prevention? Data Leakage Prevention is the category of solutions which help an organization to apply controls […]
I was reading the Joomla Update, http://developer.joomla.org/security/news/563-20130801-core-unauthorised-uploads A bug in Joomla Core and having the criticality is always awesome to […]
For my research, I chose to analyze a popular Android application for malwares. But why select a Russian version? Well, […]
In this article we will learn on how to do the forensic of USB devices, how to correlate the USB […]
by Bhushan Shah, NII Consulting Mrs Carol L. Stimmel has taken upon her to start a Computer Forensic Volunteer Project […]