Posts

Showing posts from September, 2017

LET’S TALK ABOUT - NETWORK FORENSICS

Image
LET’S TALK ABOUT - NETWORK FORENSICS BASIC CONCEPT Network forensics is a sub-branch of digital forensics relating to the monitoring and analysis of computer network traffic for the purposes of information gathering, legal evidence, or intrusion detection. Unlike other areas of digital forensics, network investigations deal with volatile and dynamic information. Network traffic is transmitted and then lost, so network forensics is often a pro-active investigation. Network forensics generally has two uses. The first, relating to security, involves monitoring a network for anomalous traffic and identifying intrusions. An attacker might be able to erase all log files on a compromised host; network-based evidence might therefore be the only evidence available for forensic analysis. The second form relates to law enforcement. In this case analysis of captured network traffic can include tasks such as reassembling transferred files, searching for keywor...

LET’S TALK ABOUT – I HAVE BEEN HACKED!

Image
LET’S TALK ABOUT – I HAVE BEEN HACKED! WHAT TO DO AFTER YOU'VE BEEN HACKED Evernote became the latest member of the "we’ve been hacked" club. And the thing is, what was once a pretty exclusive club now let’s just about everyone in these days. It's hard to know what to do, or where to begin, immediately afterward. Whether you were hacked, phished, had malware installed or just don't know what the heck happened but there's somebody all up in your e-mail, here are a few good first steps to take following an incident. This is by no means comprehensive, but it’s a good start. ASK YOURSELF WHY While you are fixing things, it's a good time to take a step back, and ask yourself a more basic question: What was the reason for the breach? If it was your bank account, the answer may be obvious. In other cases, such as e-mail, it can be for a host of reasons – from using it to send spam, to requesting money from your contacts, to gettin...