Blog2018-08-27T16:56:57-06:00

Digital Forensics & Cyber Security Blog

Digital Forensics & Cyber Security Blog

Where is that Dongle?

Where is your dongle? That was one of the first questions asked by a student when I was teaching my first FTK training course back in 2001. I had no idea what he was asking. Later I learned we had to have a "security" or dongle to help prevent folks [...]

Snake ransomware poses unique danger to industrial systems

While ransomware continues to be a major threat to enterprise IT environments around the world, a new family of ransomware poses a unique danger to companies with industrial control systems. Snake, also known as Ekans ("snake" spelled backward), follows the classic ransomware formula of encrypting most files on the target [...]

Microsoft fixes Windows Codecs flaws

Microsoft released two out-of-band security patches to address remote code execution vulnerabilities affecting Windows 10 Codecs Library, weeks ahead of the next Patch Tuesday when the company typically releases updates. The first codecs vulnerability, disclosed as CVE-2020-1425, was rated critical. If an attacker successfully exploited the flaw, they "could obtain [...]

Recover lost files on Windows 10

Windows File Recovery Currently available for Windows 10 2004 and above. Accidentally deleted an important file? Wiped clean your hard drive? Unsure of what to do with corrupted data? Windows File Recovery can help recover your personal data. For photos, documents, videos and more, Windows File Recovery supports many file [...]

Macs to run on Apple silicon, leaving Intel behind

At the Worldwide Developer Conference, Apple announced that future Macs will use ARM processors developed in-house -- "Apple silicon" -- and not the Intel Core-series CPUs on which they're presently based. During Tuesday's keynote, Apple executives -- including CEO Tim Cook and Craig Federighi, senior vice president of software engineering -- said [...]

Malware, Unwanted Spam, Phishing and Cyber Resiliency Services

What are you doing about unwanted visitors in your cyber world? Are you finding that SPAM and Malware, Ransomware, and other cyber phishing is just growing and getting out of hand? It is ugly. It isn't pretty. How are you getting your Digital Protection Programs to work? Seems that this [...]

Load More Posts
Go to Top