I

13 Flips | 2 Magazines | 4 Likes | 7 Following | 16 Followers | @ecophobia | Keep up with I on Flipboard, a place to see the stories, photos, and updates that matter to you. Flipboard creates a personalized magazine full of everything, from world news to life’s great moments. Download Flipboard for free and search for “I”

Eavesdropping in the 21st Century

Cyber TSCM uses a combination of network and site surveys, vulnerability assessments, data flow and IP mapping, malware detection, threat analysis …

21st Century

When to ask for a computer forensic second opinion

Asking for a forensic second opinion is not unlike seeking a medical one. You’d ask for one to be certain of the diagnosis & ensure that the right …

Sony RX1R Full Review | Sony’s Skunk Works Dark Horse

Privately at least, or not so privately, the Sony RX1R has stirred up a sentiment of discontent among many photography journalists, and the public. …

How to Remove Glare from Glasses in Photoshop

Rangefinder Wrist Strap

Wrist strap perfectly sized for small compact cameras old and new, analogue and digital. Cut from English Bridle Leather,and fitted with a split ring …

TorrentLocker Unlocked

Guest submission by Taneli Kaivola, Patrik Nisén and Antti Nuopponen of NIXU<p>TorrentLocker is a new breed of ransomware that has been spreading …

Analyzing and Detecting Weaponized RTF Files

At a recent RaDFIRe meeting (and the 2013 B-Sides Iowa conference) I presented research about analyzing malicious RTF documents, shellc...

Journey Into Incident Response

Others’ Approaches to Triaging the Malware Event<p>Before I dive into how I triaged the malware event I wanted to share the approaches used by others to …

Announcement: PDFiD Plugins

Encryption: Protecting the Information

Many shortcomings of encryption solutions exist: vulnerabilities of OS & hardware, poor random number generation, bugs, back doors and Insufficient …

7 Causes of InfoSec Breach

Security Breaches caused by naive users, misconfiguration, errors, malware, lost or stolen devices, disgruntled employees, focus of mass media, poor …

Computer Serial Numbers.

Serial numbers or service tags are commonly used for “unique” identification of computers. In most cases these serial numbers are modifiable.

eDiscovery Reference Model

The eDiscovery Reference Model v3 has been released. In the updated version Information Governance has taken the place of Information Management.