Using Digital Forensics To Verify Insurance Claims

Introduction Digital forensics methods are often used to uncover evidence from electronic devices to get information and verify validity of insurance claims. This is crucial in order to establish arson, insurance fraud, wrongful death, etc. These methods and techniques greatly assist insurance investigators in uncovering any digital evidence which could be accessible, password-protected, recently deleted, […]

PCI DSS for Penetration Testing

Understanding PCI DSS and PA DSS is crucial to the role of a penetration tester. Quoting the relevant PCI-DSS or PA-DSS control reference for your findings would help demonstrate the proper risk arising from common security findings such as support of older SSL versions, weak encryption when storing cardholder data, lack of proper logs from […]

Logging in MySQL

Scope: This article demonstrates logging techniques in MySQL to uncover and analyze any mischief attempts done by (outside or inside) user focusing on specific areas in database. Getting Started: Following are the types of logs available in MySQL[1]. Log Type Information Written to Log Error log Problems encountered starting, running, or stopping mysqld General query […]