Skip to main content
  • Cover
    Proactive Approach in Digital Forensics

    Digital forensics in short deals with the application of scientific knowledge for collecting, analyzing, and presenting digital evidence.  Such evidence in digital forensics are found by observing digital artifacts, such as computer systems, storage devices, network devices, related logs and dumps.

    Challenges of Digital Forensic Investigations

    Challenges of Digital Forensic Investigations

  • Cover
    Winning Court Case with Proper Digital Evidence

    Civil and Criminal Cases

    Civil law and criminal law are two broad and separate entities of law with separate sets of laws and punishments.

    According to William Geldart, Introduction to English Law 146 (D.C.M. Yardley ed., 9th ed. 1984),

  • Cover
    A Story of Cyber Attack and Incident Response
    It was one Friday afternoon in June 2015. Office workers were chatting about sport news and happy hours that night. A sudden phone call changed the happy mood altogether. A Client was under cyber attack and the website got defaced by a (in)famous hacking team. The Client's big boss was very worried and he needed to know the impact of the cyber attack, the root cause and the prevention measures RIGHT NOW.
  • Cover
    New Ways to Hack and Protect Millions of Android Devices Remotely
    The nightmare story goes like this - a recently discovered critical flaw resides in a core Android component called "Stagefright," a native Android media playback library used by Android to process, record and play multimedia files. Recently security researchers have found that there are several ways to hack millions of Android phones by exploiting the Stagefright vulnerability.
  • Cover
    We Want More on PCI DSS Penetration Test Guidance
    PCI DSS Penetration Testing Guidance was released in March 2015. It intends to be prescriptive for the internal and external penetration testers (or pen testers for short). If the guidance intends to help answer the question whether we are compliant, then it achieves its aim. If the guidance intends to help answer the question whether we are secure, then we are facing several challenges.