By: Rohit Shaw Source: eforensicsmag References http://www.forensicmag.com/articles/2011/04/sim-forensics-part-1 http://www.infosecinstitute.com/courses/mobile-computer-forensics.html https://www.visualanalysis.com/ProductsVA_SIMpull.aspx http://csrc.nist.gov/groups/SNS/mobile_security/documents/mobile_forensics/Reference%20Mat-final-a.pdf The SIM (subscriber identity module) is a fundamental component of…
Source: krebsonsecurity The U.S. Justice Department today unsealed indictments against four Chinese officers of the People’s Liberation Army (PLA) accused…
Sources: InfosecInstitute Zero-day (0day) exploit, Imperva Cybersecurity: How to get your software patching strategy right and keep the hackers at…
By Tomslin Samme-Nlar, Researcher Source: circleID Very few African states today have developed a national cybersecurity strategy or have in…
How to explain cyber threats to your CEO and others. Learn more about the potential for risk What is a…
All rights reserved 2025