Information Secur...
Follow
Find
284 views | +0 today
 
Rescooped by InfoSecMash from Data Management Tips
onto Information Security Mashup
Scoop.it!

Computer Forensics and Techniques

Computer Forensics and Techniques | Information Security Mashup | Scoop.it
Reblogged from Parul: Computer forensics is the specialized practice of investigating computer media for the purpose of discovering and analyzing available, deleted, or "hidden" information that may serve as useful evidence in a legal matter.

Via Johnny Knox
more...
No comment yet.
Your new post is loading...
Your new post is loading...
Rescooped by InfoSecMash from IT Security Unplugged
Scoop.it!

Infosecurity webinar - Bring Your Own Device - Without Losing Your Data

Infosecurity webinar - Bring Your Own Device - Without Losing Your Data | Information Security Mashup | Scoop.it
Mobile is one of the hottest topics for information security officers.

Executives and employees are demanding access to business content on their smart phones and tablets, and the race to deliver can expose organisations to serious risks.

Via IT Security Unplugged
more...
No comment yet.
Scooped by InfoSecMash
Scoop.it!

Mobile Antivirus: Don't Think About It, Just Be Sure It's There

Mobile Antivirus: Don't Think About It, Just Be Sure It's There | Information Security Mashup | Scoop.it
In exactly 3.14 weeks, my fiancee and I will finally be getting married. We're both classic worriers, so our stress level has been off the charts for the last few months in getting everything together.
more...
No comment yet.
Scooped by InfoSecMash
Scoop.it!

Easy Tips for Avoiding Twitter Hacks | Entrepreneur.com

Business ideas and trends from Entrepreneur Magazine. The latest news, expert advice, and growth strategies for small business owners.
more...
No comment yet.
Rescooped by InfoSecMash from Data Management Tips
Scoop.it!

Computer Forensics and Techniques

Computer Forensics and Techniques | Information Security Mashup | Scoop.it
Reblogged from Parul: Computer forensics is the specialized practice of investigating computer media for the purpose of discovering and analyzing available, deleted, or "hidden" information that may serve as useful evidence in a legal matter.

Via Johnny Knox
more...
No comment yet.
Scooped by InfoSecMash
Scoop.it!

Cybersecurity and the Threat to Networked Business - Forbes

Cybersecurity and the Threat to Networked Business - Forbes | Information Security Mashup | Scoop.it
Graphic: North Atlantic Treaty Organization Beware the dark side of networked business.
more...
No comment yet.
Scooped by InfoSecMash
Scoop.it!

The End of the Forensics/E-Discovery Divide - eDiscovery Insight | Litigation Support Project Management

The End of the Forensics/E-Discovery Divide - eDiscovery Insight | Litigation Support Project Management | Information Security Mashup | Scoop.it
RT @ComplexD: The End of the Forensics/E-Discovery Divide - eDiscovery Insight http://t.co/CgUUU6n4Jf (Tim Leehealey) @AccessDataGroup (The End of the Forensics/E-Discovery Divide - eDiscovery Insight | @scoopit via @jebs239
more...
No comment yet.
Scooped by InfoSecMash
Scoop.it!

Initial investigation into malware attack on South Korea identifies Chinese IP address as source

Initial investigation into malware attack on South Korea identifies Chinese IP address as source | Information Security Mashup | Scoop.it
The South Korea government has revealed that initial investigations into the malware attack that affected networks belonging to key banks and broadcasters yesterday has been pinpointed ...
more...
No comment yet.
Scooped by InfoSecMash
Scoop.it!

Exchange Online getting serious about helping with eDiscovery ... | Litigation Support Project Management

Exchange Online getting serious about helping with eDiscovery ... | Litigation Support Project Management | Information Security Mashup | Scoop.it
In Exchange Online and Exchange Server 2013, you can use In-Place Hold to preserve mailbox content for litigation or investigations. Many organizations also need to preserve mailbox data for users who are no longer in the ...
more...
No comment yet.
Rescooped by InfoSecMash from High Technology Threat Brief (HTTB) (1)
Scoop.it!

Smartphone Forensics and the Future of Forensic Analysis | Video Forensic Expert

Smartphone Forensics and the Future of Forensic Analysis | Video Forensic Expert | Information Security Mashup | Scoop.it
Video Forensic Expert Ed Primeau discusses smartphone forensics and how it could affect the future of forensic analysis. (What effect do smartphones have on #forensic science?

Via Daniel A. Libby, CFC
more...
No comment yet.
Rescooped by InfoSecMash from Digital Forensics Graduation Project
Scoop.it!

Infosecurity - House, Obama Administration nearing an agreement on CISPA

US House of Representatives Intelligence Committee Chairman Mike Rogers (R-Mich.) said that his committee’s negotiations with the White House on a new cybersecurity bill have resumed, with a draft for markup on target to appear in April.

Via MacKenzie Czarnecki
more...
No comment yet.
Scooped by InfoSecMash
Scoop.it!

dig4n6

dig4n6 | Information Security Mashup | Scoop.it
A blog by Ethan Fleisher about: Computer Forensics - Windows 8 Forensics - Champlain College - Patrick Leahy Center for Digital investigation (LCDI)
more...
No comment yet.
Scooped by InfoSecMash
Scoop.it!

How to Keep Up with RSAC When Not at RSAC

How to Keep Up with RSAC When Not at RSAC | Information Security Mashup | Scoop.it
One of the questions that often comes up for those not attending the annual shindig known as the RSA Conference (RSAC) is "How do I keep with everything going on at RSAC when I'm not there?" I was ...
more...
No comment yet.
Scooped by InfoSecMash
Scoop.it!

Eli’s Anti-Malware Plugin For Wordpress Review – Best Anti-Malware Plugin of 2012 |

Eli’s Anti-Malware Plugin For Wordpress Review – Best Anti-Malware Plugin of 2012 | | Information Security Mashup | Scoop.it
This is a quick review for those of you interested in running a wordpress website who are worried about preventing malware issues, or those of you who actually (Eli's Anti-Malware Plugin For Wordpress Review - Best Anti-Malware Plugin of 2012
more...
No comment yet.
Scooped by InfoSecMash
Scoop.it!

CashU Warns Users Against Malware Threats - Naharnet

CashU Warns Users Against Malware Threats - Naharnet | Information Security Mashup | Scoop.it
Naharnet CashU Warns Users Against Malware Threats Naharnet The regional online payment provider CashU warned Middle East PC users against potential increase in malware threats and recent virus attacks across region, falsely pose as legitimate...
more...
No comment yet.
Scooped by InfoSecMash
Scoop.it!

Released 2007 NSA Document Shows How Cyber Spies Are Trained to Find Information ‘Not Intended for Public Distribution’ | TheBlaze.com

Released 2007 NSA Document Shows How Cyber Spies Are Trained to Find Information ‘Not Intended for Public Distribution’ | TheBlaze.com | Information Security Mashup | Scoop.it
Much of the National Security Agency is under a shroud of secrecy, but a recently released document is giving us some insight into how its cyber spies were trained to use search engines and other online tools.
more...
No comment yet.
Scooped by InfoSecMash
Scoop.it!

PayPal's chief information security officer says passwords' days are numbered

PayPal's chief information security officer says passwords' days are numbered | Information Security Mashup | Scoop.it
Recently speaking at the Interop IT conference, PayPal's chief information security officer, Michael Barrett, stated that passwords and PINs were (RT @techdelight: PayPal's chief information security officer says passwords' days are numbered #technology...
more...
No comment yet.
Rescooped by InfoSecMash from Information #Security #InfoSec #CyberSecurity #CyberSécurité #CyberDefence
Scoop.it!

Windows Booting Process

Windows Booting Process | Information Security Mashup | Scoop.it

Via Frederic GOUTH
more...
No comment yet.
Scooped by InfoSecMash
Scoop.it!

When Big Brother Meet Malware

When Big Brother Meet Malware | Information Security Mashup | Scoop.it
tl;dr TELKOM security sucks
Last month i tweets about PT. Telekomunikasi Indonesia Tbk (TELKOM) big brother and was unable to access several websites because their networks listed in known bot...
more...
No comment yet.
Scooped by InfoSecMash
Scoop.it!

TR-12 - Analysis of a PlugX malware variant used for targeted attacks

TR-12 - Analysis of a PlugX malware variant used for targeted attacks | Information Security Mashup | Scoop.it
Analysis of a PlugX malware variant used for targeted attacks: http://t.co/AzTZgYiJrz
more...
No comment yet.
Scooped by InfoSecMash
Scoop.it!

A BIG password cracking wordlist

Defuse Security have released the word-list used by their Crackstation project It really is something..  The numbers? 4.2 GiB compressed. 15 GiB uncompressed. 1,493,677,782 words It’s a mix of ever...
more...
No comment yet.
Rescooped by InfoSecMash from High Technology Threat Brief (HTTB) (1)
Scoop.it!

Pen Tester's Guide: Steps for Executing a Social-Engineering Attack

Pen Tester's Guide: Steps for Executing a Social-Engineering Attack | Information Security Mashup | Scoop.it
A detailed guide for testing your organization's insiders and their vulnerability to a social-engineering attack via a targeted spear-phishing campaign (Pen Tester's Guide: Steps for Executing a Social-Engineering Attack

Via Daniel A. Libby, CFC
more...
No comment yet.
Rescooped by InfoSecMash from High Technology Threat Brief (HTTB) (2)
Scoop.it!

VandaTheGod hacks several Government websites

VandaTheGod hacks several Government websites | Information Security Mashup | Scoop.it
A Hacker named VandaTheGod from UGNazi hacker group, has breached several Government websites and other websites.

Via Daniel A. Libby, CFC
more...
No comment yet.
Rescooped by InfoSecMash from Mobile Forensic Investigation
Scoop.it!

'Digital Omnivores' Devouring Video on Tablets, Study Says

'Digital Omnivores' Devouring Video on Tablets, Study Says | Information Security Mashup | Scoop.it
There were 160 percent more “digital omnivores” at the end of last year than there were at the end of 2011, according to a new study Deloitte will release Wednesday.

Via Christa Miller
more...
Christa Miller's curator insight, March 21, 2013 8:28 PM

More media = greater quantities of digital evidence...

Rescooped by InfoSecMash from High Technology Threat Brief (HTTB) (1)
Scoop.it!

Case Leads: DFIR Lessons from Sandy; The Advanced Persistent Intruder; The Secure Breach; Windows8 Forensics; South Carolina Tax Info Protected by "TWO FIREWALLS"

RT @sansforensics New #DFIR Blog Post: DFIR Lessons from Sandy; The Advanced Persistent Intruder The Secure Breach more http://t.co/Ja3V61ud...

Via Daniel A. Libby, CFC
more...
No comment yet.
Scooped by InfoSecMash
Scoop.it!

Watch "11-year-old malware writers" Video at SCMagazine

Watch "11-year-old malware writers" Video at SCMagazine | Information Security Mashup | Scoop.it
AVG security researchers have come across malicious code written by youngsters, some as young as 11 years old. The researchers believe kids are testing newfound computer skills in the wild, and that they need to know the dangers of such activity.
more...
No comment yet.