LAS VEGAS, Sept. 21, 2010 - MANDIANT, the leader in incident response and computer forensics solutions and services, today announced several upgrades to Memoryze, its industry-leading memory forensics ...
We know about forensic tools for our desktops and laptops. But what about mobile devices, cloud computing and the computers in vehicles? We know about forensic tools for our desktops and laptops. But ...
The surveillance-for-hire industry's powerful mobile spyware tools have gotten increasing attention lately as tech companies and governments grapple with the scale of the threat. But spyware that ...
Researchers will release an open source tool at Black Hat USA that helps forensics investigators reconstruct attacks that use a popular Metasploit payload to covers its tracks. Mandiant's Steve Davis ...
Every now and then, forensic experts or just curious novices will have to investigate technologies using tools that are not always readily available. For that reason, this post explores simple ways ...
Why: "Proactive threat hunting shifts the mindset from reacting to an attack after it happens to actively looking for suspicious behavior before damage is done. " Register to attend TechMentor by June ...
(The Conversation is an independent and nonprofit source of news, analysis and commentary from academic experts.) David Oygenblik, Georgia Institute of Technology and Brendan Saltaformaggio, Georgia ...
With the wide usage of smartphones in our daily life, new malware is emerging to compromise the mobile OS and steal the sensitive data from the mo- bile applications. Anti-malware tools should be ...
Trusted Hardware and Execution Authors, Creators & Presenters: Yiming Zhang (Southern University of Science and Technology and The Hong Kong Polytechnic University), Fengwei Zhang (Southern University ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results