Spear Phishing – Beware Of Your “Friend”
What is a Spear Phishing? Spear phishing is a deceptive communication technique in which a victim is lured via e-mail, […]
What is a Spear Phishing? Spear phishing is a deceptive communication technique in which a victim is lured via e-mail, […]
Bring your own device (BYOD) is the business policy of letting employees bring their own devices at workplace for doing […]
What is Mobile Device Management? Mobile Device Management (MDM) software secures monitors, manages and supports mobile devices deployed across mobile […]
From the year 2012-2025 ICAO(International civil aviation organization) have decided to transform the present aviation environment by introducing new […]
Below are the steps of how to fix the banner (version information) in IIS 7.5 Install the latest version of […]
Scope: This article demonstrates logging techniques in MySQL to uncover and analyze any mischief attempts done by (outside or inside) […]
From forensics point of view, investigating “which user did what on the application/server that lead to its compromise” is of the most importance. Similar scenario applies to Email investigation. It’s quite simple now to find out the IP Address of the person who is sending out fishy or threatening emails to the victim(s).
by Toufiq Ali, NII Consulting Before you read further make sure you back up all the original settings of the […]
In this article we will learn on how to do the forensic of USB devices, how to correlate the USB […]
from NII Consulting The IT Act 2000 is a large repository of fine print fraught with judicial jargon and varying […]