Read more about computer forensics
Bookmark and Share
  • Breaking the backlog of digital forensic evidence

    23.12.2013

    It is time for a change in the way the law enforcement works with digital forensic evidence.

  • Unified Communications Forensics

    21.11.2013

    Authors: Nicholas Grant and Joseph Shaw Pages: 156 Publisher: Syngress ISBN: 1597499927 Introduction “Unified Communications is the integration of real-time communication services such as instant messaging, presence information, telephony (including IP telephony), video conferencing, data sharing, call control and speech recognition with non-real-time communication services such as unified messaging (integrated voicemail, e-mail, SMS and fax),” Wikipedia explains.

  • Innovation, big data and the future of information security

    02.10.2013

    Dr. Herbert (Hugh) Thompson is Program Chair for RSA Conferences and a world-renowned expert on IT security.

  • Placing the Suspect Behind the Keyboard

    05.09.2013

    Author: Brett Shavers Pages: 320 Publisher: Syngress ISBN: 1597499854 Introduction There are many books addressing the subject of computer forensics out there, but this tome is one of the rare ones that approaches cybercrime investigations in a holistic manner, i.e.

  • (IN)SECURE Magazine issue 38 released

    19.06.2013

    (IN)SECURE Magazine is a free digital security publication discussing some of the hottest information security topics.




Spotlight

Attackers use reflection techniques for larger DDoS attacks

Posted on 17 April 2014.  |  Instead of using a network of zombie computers, newer DDoS toolkits abuse Internet protocols that are available on open or vulnerable servers and devices. This approach can lead to the Internet becoming a ready-to-use botnet for malicious actors.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Fri, Apr 18th
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //