What you need to know about Patch Management

Malware exists to take advantage of software flaws. To close those holes, patches are available. Why do so many vulnerabilities still exist without a fix? What makes patch management so difficult? Unfortunately, security and IT professionals don't work in a…

6 Common Phishing Attacks and How to Protect Against Them

By: David Bisson Source: Tripwire.com Phishing attacks continue to play a dominant role in the digital threat landscape. In its 2020 Data Breach Investigations Report (DBIR), for instance, Verizon Enterprise found that phishing was the second topmost threat action variety in security…

Understanding SIM Card Forensics

By: Rohit Shaw Source: eforensicsmag References http://www.forensicmag.com/articles/2011/04/sim-forensics-part-1 http://www.infosecinstitute.com/courses/mobile-computer-forensics.html https://www.visualanalysis.com/ProductsVA_SIMpull.aspx http://csrc.nist.gov/groups/SNS/mobile_security/documents/mobile_forensics/Reference%20Mat-final-a.pdf The SIM (subscriber identity module) is a fundamental component of cellular phones. It’s also known as an integrated circuit card (ICC), which is a microcontroller-based access module. It is a…