Latest news & articles

Understanding SIM Card Forensics

By: Rohit Shaw Source: eforensicsmag References http://www.forensicmag.com/articles/2011/04/sim-forensics-part-1 http://www.infosecinstitute.com/courses/mobile-computer-forensics.html https://www.visualanalysis.com/ProductsVA_SIMpull.aspx http://csrc.nist.gov/groups/SNS/mobile_security/documents/mobile_forensics/Reference%20Mat-final-a.pdf The SIM (subscriber identity module) is a fundamental component of…

By April 2020

U.S. Charges 4 Chinese Military Officers in 2017 Equifax Hack

Source: krebsonsecurity The U.S. Justice Department today unsealed indictments against four Chinese officers of the People’s Liberation Army (PLA) accused…

By April 2020

Zero-day attacks: Protections, best practices and how to implement them

Sources: InfosecInstitute Zero-day (0day) exploit, Imperva Cybersecurity: How to get your software patching strategy right and keep the hackers at…

By April 2020

Cyberspace Security in Africa – Where Do We Stand?

By Tomslin Samme-Nlar, Researcher Source: circleID Very few African states today have developed a national cybersecurity strategy or have in…

By April 2020

What is a Cyber Threat? How to Explain Cyber Threats to Your CEO

How to explain cyber threats to your CEO and others. Learn more about the potential for risk What is a…

By February 2017