Juan Carlos Ruiloba

56 Added | 5 Magazines | 29 Likes | 1 Following | 10 Followers | @juancrui | Keep up with Juan Carlos Ruiloba on Flipboard, a place to see the stories, photos, and updates that matter to you. Flipboard creates a personalized magazine full of everything, from world news to life’s great moments. Download Flipboard for free and search for “Juan Carlos Ruiloba”

Actualiza Chrome 61 cuanto antes, Google detecta y corrige dos fallos de ...

Cuando hablamos de seguridad y privacidad a la hora de movernos por Internet, no cabe duda de que uno de los elementos que más trascendencia tienen …

NASA identifies 219 new planet candidates - and 10 potential 'Earths'

Our knowledge of the galaxy just expanded significantly, thanks to NASA’s Kepler space telescope. The exoplanet-finding machine just discovered 219 …

Universe

Top 7 tips to protect yourself from cybercrime

Security software, processes and systems are not enough to beat cybercriminals. They’re clever, they’re focused and they have time. South Africa is …

Cybersecurity

PowerForensics v1.0.1 released – is a PowerShell digital forensics framework. – Security List Network™

<b>Changelog v-1.0.1</b>:<br>+ This release features minor bug fixes, initial Pester tests, and updated help.<br>+ It also signifies the merging of the …

Forensics

Protege tu empresa

Formulario de contacto para empresas<p>¿Tienes alguna consulta sobre nuestros servicios? ¿Te ha afectado algún problema de ciberseguridad?<br>INCIBE responde<p>…

Windows Phone 7.8 Forensics

<b>Evidence examination</b><p>Mobile device analyzed: NOKIA Lumia 800<p>The forensic acquisition produced a 15 GB raw image. When I opened the file, all I got was …

Live Memory Forensics on Android devices

This presentation deals with some RAM forensics on the Android OS using the LiME tool for getting a RAM dump and the Volatility framework for the analysis part!

Forensics

CAINE Live USB/DVD - computer forensics digital forensics

NEW! CAINE 9.0 "Quantum" is out!<br>Windows side forensics and incident response(tools renewed + extra tools)<p>CAINE 9.0 "Quantum" 64bit - Official CAINE …

Linux ransomware already infected at least tens of users

Researchers at Russian antivirus company Doctor Web have discovered a Linux ransomware that has already infected tens of users.<p>Ransomware is a …

Every Android device is vulnerable to newly discovered bugs

With two new "Stagefright" vulnerabilities discovered, almost every Android device ever released is vulnerable to malicious hackers. Fixing the bug isn't simple.<p>Two major vulnerabilities have been discovered in Google's Android mobile software by the same security company that found a whole series …

Information Security

Do your security homework before storing big data in the cloud

Here's what an IT leader needs to ask cloud service providers about storage, preparation, and analytics capabilities to ensure their organization's …

Encryption

How cybercrime has evolved over the past 5 years

Intel has used the 5th anniversary of their purchase of security company McAfee to release a review of how the cybersecurity landscape has changed in …

5 Ways to Keep Hackers Away From Your Money

Start by rethinking your password strategy.<p>JPMorgan Chase, Domino’s, Home Depot, P.F. Chang’s, eBay — the list of targets continues to …

Identity Theft

OPM Now Admits 5.6m Feds' Fingerprints Were Stolen By Hackers

When hackers steal your password, you change it. When hackers steal your fingerprints, they've got an unchangeable credential that lets them spoof …

A quick tour in the hacking black market

A quick tour in the Black Markets, the places on the web where it is possible to acquire or rent “malicious” services and illegal products.<p>Black …

8 free Wi-Fi stumbling and surveying tools for Windows and Mac

There is enterprise-level software for surveying Wi-Fi networks, but even in large wireless networks, simple freeware tools are handy for a quick …

Wi-Fi

New Web addresses a cybercrime playground

The proliferation of new Web addresses has created a free-for-all as cyber criminals race to spread malware or steal personal information with new …

How cybercrime has changed over the past 5 years (it hasn't got any better)

Intel has used the 5th anniversary of their purchase of security company McAfee to release a review of how the cybersecurity landscape has changed in …

Top 20 Free Disk Tools for SysAdmins

This article lists 20 of the best free tools for partitioning, cloning, diagnostics, repair, recovery, encryption, wiping or drive information and is …

Five signs an employee plans to leave with your company’s data

A global high-tech manufacturer had reached its boiling point after several of its sales reps left the company unexpectedly and took with them sales …

Forensics: Automating Active Directory Account Lockout Search with PowerShell (an example of deep XML filtering of event logs across multiple servers in parallel)

OverviewToday we learn how to efficiently filter event log queries, going beyond simple event ID filtering into the specific values of the XML …

Databases

Countering Anti-Forensic Efforts – Part 1

by Oleg Afonin, Danil Nikolaev & Yuri Gubanov<br>© Belkasoft Research 2015Computer forensic techniques allow investigators to collect evidence from …

Forensics

6 Free Local Tools for Analyzing Malicious PDF Files

Malicious PDF files are frequently used as part of targeted and mass-scale computer attacks. Being able to analyze PDFs to understand the associated …

SANS DFIR Webcast -- Cache Me If You Can!