Skip to main content
  • Cover
    Winning Court Case with Proper Digital Evidence

    Civil and Criminal Cases

    Civil law and criminal law are two broad and separate entities of law with separate sets of laws and punishments.

    According to William Geldart, Introduction to English Law 146 (D.C.M. Yardley ed., 9th ed. 1984),

  • Cover
    A Story of Cyber Attack and Incident Response
    It was one Friday afternoon in June 2015. Office workers were chatting about sport news and happy hours that night. A sudden phone call changed the happy mood altogether. A Client was under cyber attack and the website got defaced by a (in)famous hacking team. The Client's big boss was very worried and he needed to know the impact of the cyber attack, the root cause and the prevention measures RIGHT NOW.
  • Cover
    New Ways to Hack and Protect Millions of Android Devices Remotely
    The nightmare story goes like this - a recently discovered critical flaw resides in a core Android component called "Stagefright," a native Android media playback library used by Android to process, record and play multimedia files. Recently security researchers have found that there are several ways to hack millions of Android phones by exploiting the Stagefright vulnerability.
  • Cover
    We Want More on PCI DSS Penetration Test Guidance
    PCI DSS Penetration Testing Guidance was released in March 2015. It intends to be prescriptive for the internal and external penetration testers (or pen testers for short). If the guidance intends to help answer the question whether we are compliant, then it achieves its aim. If the guidance intends to help answer the question whether we are secure, then we are facing several challenges.
  • Cover
    The Cat-Mouse Game of Digital Forensics

    Digital Forensics, Anti-Forensics, and Anti-Anti-Forensics

    (A) Digital Forensics

    Digital forensics aims to investigate various digital issues of unauthorized access, data breach, theft of intellectual property, unauthorized use of company resources, and so on.

    To achieve these aims it is necessary to preserve evidence data in original state, then to image such data for analysis and reporting in a court admissible format.