Vincent Lemoine
74 views | +0 today
Follow
Your new post is loading...
Your new post is loading...
Rescooped by Lemoine Vincent from Digital-News on Scoop.it today
Scoop.it!

Top Links of Tools Compilation for Pentesting, Forensics, Security, and Hacking

Top Links of Tools Compilation for Pentesting, Forensics, Security, and Hacking | Vincent Lemoine | Scoop.it
Are you still looking for a suite of tools that may complete your day-to-day activities, or are you just looking for new tools that you can try or play with? No need to worry, because today is your lucky day!

Via Thomas Faltin
more...
No comment yet.
Rescooped by Lemoine Vincent from Digital-News on Scoop.it today
Scoop.it!

Windows Systems and Artifacts in Digital Forensics: Part III: Prefetch Files

Windows Systems and Artifacts in Digital Forensics: Part III: Prefetch Files | Vincent Lemoine | Scoop.it
1. Introduction In this article, I’m going to focus on prefetch files, specifically, their characteristics, structure, points of interest in terms of forensic importance, uses, configuration, forensic value and metadata.

Via Thomas Faltin
more...
No comment yet.
Rescooped by Lemoine Vincent from Digital-News on Scoop.it today
Scoop.it!

Customer selects Cloudmeter to conduct Data Forensics

Customer selects Cloudmeter to conduct Data Forensics | Vincent Lemoine | Scoop.it
"Data forensics" helps a Cloudmeter customer offer significant value to customer campaigns. It selected Cloudmeter to help improve the company's analysis of customer online sessions and pass data to its business intelligence systems.

Via Thomas Faltin
more...
No comment yet.
Rescooped by Lemoine Vincent from Cyber Security & Digital Forensics
Scoop.it!

Malware, Spam, and Phishing – Most common Threats to Business

Malware, Spam, and Phishing – Most common Threats to Business | Vincent Lemoine | Scoop.it
Attacks that employ a variety of malicious programmes, phishing attacks, and spam remain the cyber threats most frequently encountered by companies. At the same

Via Constantin Ionel Milos / Milos Constantin
more...
No comment yet.
Rescooped by Lemoine Vincent from Glossarissimo!
Scoop.it!

(EN) - SIM Card Forensics: An Introduction | InfoSec Institute

(EN) - SIM Card Forensics: An Introduction | InfoSec Institute | Vincent Lemoine | Scoop.it

"The SIM (subscriber identity module) is a fundamental component of cellular phones. It also known as an integrated circuit card (ICC), which is a microcontroller-based access module. It is a physical entity and can be either a subscriber identity module (SIM) or a universal integrated circuit card (UICC). A SIM can be removed from a cellular handset and inserted into another; it allows users to port identity, personal information, and service between devices. All cell phones are expected to incorporate some type of identity module eventually, in part because of this useful property. Basically, the ICC deployed for 2G networks was called a SIM and the UICC smart card running the universal subscriber identity module(USIM) application. The UICC card accepts only 3G universal mobile telecommunications service (UMTS) commands. USIMs are enhanced versions of present-day SIMs, containing backward-compatible information. A USIM has a unique feature in that it allows one phone to have multiple numbers. If the SIM and USIM application are running on the same UICC, then they cannot be working simultaneously.

The first SIM card was about the size of a credit card. As technology developed, the cell phone began to shrank in size and so did the SIM card. The mini-SIM card, which is about one-third the size of a credit card. But today we are using smartphones that use micro-SIM, which is smaller than mini-SIM. These SIM cards vary in size but all have the functionality for both the identification and authentication of the ..."


Via Stefano KaliFire
more...
No comment yet.
Rescooped by Lemoine Vincent from High Technology Threat Brief (HTTB) (1)
Scoop.it!

Registry Analysis for Digital Forensics and Incident Response Master Class: NOW LIVE | PRLog

Registry Analysis for Digital Forensics and Incident Response Master Class: NOW LIVE. Digital forensics experts Vico Marziale, Joe T.


Via Daniel A. Libby, CFC
more...
No comment yet.
Scooped by Lemoine Vincent
Scoop.it!

Analyzing Malicious PDFs - InfoSec Institute

Analyzing Malicious PDFs - InfoSec Institute | Vincent Lemoine | Scoop.it
PDF files have become very common in everyday work. It’s hard to imagine business proposals without PDFs. The PDF format is used in almost all companies to share business deals, company brochures, and even invitations.
more...
No comment yet.