How To Build Your Own CSI Forensics Lab

How To Build Your Own CSI Forensics Lab

If you’ve been waiting for the right handbook to come along and tell you how to build your own forensic laboratory, keep waiting. The National Institute of Standards Technology (NIST)’s new edition of the “Forensic Science Laboratories: Handbook for Facility …

    

via https://feeds.wired.com/c/35185/f/661467/s/2f057b2a/l/0L0Swired0N0Cthreatlevel0C20A130C0A70Cnist0C/story01.htm

Intrusion Deception – Counter offense is the best defense

Information Security mostly revolves around defense in depth. Hitherto, we have had ‘Intrusion Detection’ and ‘Intrusion Prevention’ tools and techniques. But the newest technique in securing information assets, ‘Intrusion Deception’, has turned the security concept upside down and relies on counter offensive ‘honey pot’ methodology to protect the information assets in an organization. Continue reading “Intrusion Deception – Counter offense is the best defense”

Mobile Phone Flaw Opens 500m SIMs To Hackers

A flaw has been discovered in the security of 500 million mobile phones that could them vulnerable to attack, cyber researchers have said.

via https://www.topix.net/tech/computer-security/2013/07/mobile-phone-flaw-opens-500m-sims-to-hackers?fromrss=1

This Is Not a Test: Emergency Broadcast Systems Proved Hackable

https://www.youtube.com/watch?v=nc60XPCXrh8#action=share

Several models of Emergency Alert System decoders, used to break into TV and radio broadcasts to announce public safety warnings, have vulnerabilities that would allow hackers to hijack them and deliver fake messages to the public, according to an announcement by a security firm on Monday.

The vulnerabilities included a private root SSH key that was distributed in publicly available firmware images that would have allowed an attacker with SSH access to a device to log in with root privileges and issue fake alerts or disable the system.

Tags: 

Original article here.