Microsoft Issues Adobe Patch to Tackle Flash Zero-Day

2018-02-08T12:26:00+00:00 February 7th, 2018|Tags: , , |

Microsoft has released Adobe's patch for a critical flaw in Flash Player that suspected North Korean hackers have exploited in malicious Excel sheets. Researchers at Cisco Talos said hackers known as Group 123 were using the zero-day Flash flaw and Excel sheets [...]

Half of Norway Had Their Data Compromised

2018-01-25T14:16:42+00:00 January 25th, 2018|Tags: , , , |

Hackers have breached the systems of Norway's Health South East RHF (Helse Sør-Øst RHF), and possibly made off with personal information and health records of approximately 3 million Norwegians. Health South-East is investigating an unauthorized intrusion into its IT systems [...]

The Best Open Source Digital Forensic Tools

2018-01-29T17:17:59+00:00 January 22nd, 2018|Tags: , , , |

Forensic investigations are always challenging as you may gather all the information you could for the evidence and mitigation plan. Here are some of the computer forensic investigator tools you would need. Most of them are free! Whether it’s for [...]

A Vancouver Driver Was Caught Playing Pokemon Go While Driving

2018-01-25T14:37:37+00:00 January 9th, 2018|Tags: , , |

In November, a  Canadian man took distracted driving to a new level by setting up his own entertainment system on his steering wheel with string. He was caught when a traffic officer spotted him wearing headphones and noticed a tablet [...]

​A Flaw in Google’s Bug Tracker Exposed Private Security Vulnerability Reports

2017-11-06T16:19:59+00:00 November 6th, 2017|Tags: , , |

The bug allowed the researcher to see the most sensitive vulnerabilities in Google's services. However the bug was patched within an hour of learning about the exploit. Google has an internal platform called Google Issue Tracker that tracks a list [...]

Malware Using Security Camera & Infared Light to Steal Information

2017-10-13T11:43:18+00:00 October 13th, 2017|Tags: , , |

Organizations use to protect their internal networks from Internet attacks by using firewalls, intrusion detection systems(IDSs) and intrusion prevention systems (IPSs). For a higher degree of protection, so-called ‘air-gap‘ isolation is used. Once the malware deployed attackers try to establish [...]