Report on Big Data & Data Analytics in Homeland Security Market
| |

The use of big data and data analytics by Homeland Security, Public Safety organizations and Intelligence agencies is on the rise, mostly because the world is becoming more digital and connected. This is creating new opportunities, not only for data … Read More

EU citizens want a higher level of privacy protection
| |

A large majority of the 27,000 respondents to the Eurobarometer survey say that the privacy of their personal information, their online communications and their online behaviour is very important. In particular: More than seven in ten (72%) state that it … Read More

Take care of a new Facebook Messenger malware
| |

In accordance with CheckPoint, the ransomware visrus is also present on LinkedIn. Usually, the computer is infected by a download of a .svg image that redirect to a video requiering tu install a pseudo-extension needed to rule the video. A … Read More

Denial of service
| |

A denial-of-service (DoS) attack is any of certain forms of malicious damage to computer systems. The aim of such an attack is to prevent legitimate users from accessing their services. A DoS attack is generated in a number of ways. … Read More

Fork bomb
| |

The fork bomb is a form of denial of service attack against a computer system. It relies on the assumption that the number of programs and processes which may be simultaneously executed on a computer has a limit. A fork … Read More

Computer bugs
| |

(Photo of first computer bug.) A computer bug is a fault in a computer program which prevents it from working correctly. Bugs arise from mistakes in either a program’s source code or its design. It is said that there are … Read More

Buffer overflow
| |

A buffer overflow is a type of computer bug. When the length limitation of a space reserved for data – a buffer – is not properly enforced, a buffer overflow may occur. Input data is written to the buffer and, … Read More

Blue screen of death
| |

The so-called blue screen of death, also abbreviated as BSoD, refers to the screen displayed by Microsoft’s Windows operating system when it cannot (or is in danger of being unable to) recover from a system error. There are two Windows … Read More

Code of Ethics for Cybercrime Investigators
| |

(Source: International Association of Computer Investigation Specialists) Maintain the highest level of objectivity in all forensic investigations and present the facts correctly;   Examine and analyze in detail the evidence;   Examine in compliance with established principles and validated by … Read More

Procedures model for the forensic examination of computer systems
| |

(Source: International Association of Computer Investigation Specialists) Hard disk examination Sterile conditions are established in terms of crime. All storage media used during the examination are prepared recently, cleaned of extraneous data, anti-virus checked and tested before use;   All … Read More

Principles in digital evidence
| |

(Source: International Organization on Computer Evidence) In the process of obtaining digital evidence, actions taken should not alter the evidence.   Where it is necessary for a person to access original digital evidence, that person must be competent in terms … Read More

Standards in the field of digital forensics
| |

(Source: Scientific Working Group on Digital Evidence) Principle 1 In order to ensure that digital evidence is collected, preserved, examined, or transferred in a manner safeguarding the accuracy and reliability of the evidence, law enforcement and forensic organizations must establish … Read More

1 2 3 4 8