Sunday, October 31, 2010
OPERATION CISCO RAIDER
VIRUS in Boot Sector in Hard Disk fresh from OEM!!!!
Image Ballistics : Incredible IT
3. I checked up the state of pics clicked from my camera years back and all answers were correct.....few Nikon,few sony.......one easy and free tool for such investigation is JPEGSNOOP.Simple to download,very small size and great analysis report.....
Tuesday, October 26, 2010
Crack 14 Character passwords in Seconds : Objectif Sécurité
Wednesday, October 20, 2010
Collection of Forensic Softwares : TUCOFS
Tuesday, October 19, 2010
Service Packs & Infection Rates
Monday, October 18, 2010
CaaS : CRIME WARE AS A SERVICE at offer now
Saturday, October 16, 2010
Stuxnet : Some more good info
Is ur Account Hacked ?- Common ways u get compromised.
- Password re-use: You sign up for an account on a third-party site with your Google username and password. If that site is hacked and your sign-in information is discovered, the hijacker has easy access to your Google Account.
- Malware: You use a computer with infected software that is designed to steal your passwords as you type (“keylogging”) or grab them from your browser’s cache data.
- Phishing: You respond to a website, email, or phone call that claims to come from a legitimate organization and asks for your username and password.
- Brute force: You use a password that’s easy to guess, like your first or last name plus your birth date (“ujjwal3008”), or you provide an answer to a secret question that’s common and therefore easy to guess, like “dosa” for “What is your favorite food?”
Friday, October 15, 2010
CANURE : 100 on ACID3 Test
Another Wowwwwww!!!!-CYBERTECTURE
Tuesday, October 12, 2010
Biggest release of Patch update by MICROSOFT
Monday, October 11, 2010
Stuxnet : A Milestone in Malicious Code History
Friday, October 08, 2010
Here comes Trojan-PWS-Nslogm to steal Passwords and credentials from Mozilla
RISK MANAGEMENT : Beware while u update with Patches
ALL izz WELL!!!!!inside this- Check out FREE STUDIO
Security Enabled Hardware :INTEL - McAfee Merger
Thursday, October 07, 2010
CLEANERS & FOOTPRINTS
Thursday, September 30, 2010
Shadows in the Cloud : Cyber Espionage
Shadows in the Cloud
Sunday, September 19, 2010
Browser Forensics - Not Simple
Saturday, September 18, 2010
Root Kits : Hidden Undetected Threats
ZERO DAY EXPLOIT : ???
Thursday, September 16, 2010
Cyber Warfare : It has started
Wednesday, September 15, 2010
ORDER OF VOLATILITY OF DIGITAL EVIDENCE
1. Not all information-based evidence is the same! Evidence can be organized into an “order of volatility” meaning how long it will stick around for you to collect until it automatically is lost.
2. Dan Farmer & Wietse Venema created the below table of evidence volatility, which is commonly referenced by forensic professionals. For example, information stored on a CD-R or some optical storage media can last for about 10-100 years depending on the brand used. Information stored in a computer’s main memory, by contrast, will last for only tens of nanoseconds before it is wiped out by the computer’s normal processing.
TYPE OF DATA | LIFESPAN |
Registers, peripheral memory, caches, etc. | Nanoseconds or less |
Main memory | Ten nanoseconds |
Network state | Milliseconds |
Running processes | Seconds |
Disk | Minutes |
Floppies, backup media, etc. | Years |
CD-ROMs, printouts, etc. | Tens of years |
3. Very critical from forensics point of view.....most people would want to turn a computer off (or at the very least unplug it from the network) when they realize an incident has occurred. However, as noted in the chart above, one will lose evidence in main memory and “network state” information (which other systems the computer is connected with and what information they are exchanging) with such an approach. Even shutting down a computer the “normal” way (Start / Turn Off Computer / Turn Off in Windows XP) can delete evidence, as Windows performs a number of housekeeping tasks in the shutdown process, such as closing opened files and clearing out the temporary disk cache.
4. Thanks Peter C. Hewitt (Read from Browser Forensics).
Monday, September 13, 2010
New Gen BIOMETRICS : PALMSECURE from FUJITSU
- Physical access control / Time and Attendance
- User authentication to PCs or server systems
- Government / Commercial identity management systems
- OEM terminal devices (POS, ATMs or information kiosks)
- Other industry-specific applications
Monday, September 06, 2010
E-Waste & Indian Policy
Thursday, September 02, 2010
TABNAPPING : A new generation Cyber Crime
ScareWare : One more WAREior in the family
- Criminals buy blocks of advertisement space on websites, intermittently slipping in a tainted advertisement.
- Just visiting a webpage with a tainted ad causes a fake warning box to appear.
- Clicking "OK" or "Cancel" launches the same thing: a "free scan."
- The bogus scan will purport to find a virus infestation.
- Ensuing boxes steer the user to activate "Personal Antivirus," on left.
- The activation prompts take the user to a shopping cart.
- Declining to place an order triggers endless fake scans.