After some months of rest, i’ve decided to star again publishing of my Weekly RoundUp. Why? That’s simple: i also started a process of Social Media Detox, that involve deactivation of my Social Network accounts. Without them, i don’t have any way to share with my followers interesting links that i’ve read in the week….
When a security incident occurs on your network, one of the most important steps of the response process is the identification of all assets involved by the attack.
Let’s starting a series of article related to digital forensic focused on mobile devices. In this first post i’d like to share some thoughts about image acquisition on android devices.
Often, during an incident response, may be necessary to analyze a lot of evidences, like disk and memory dumps.
Microsoft provides Shims to developers mainly for backward compatibility, but malware can take advantage of shims to target an executable for both persistence and injection.