In Part IV of the Website Hacking series, we are going to look at:
Storing your email address and telephone number in <a href=mailto:*> and <a href=”tel:*> and the inherent […]
To view Part I of the article series, please open: http://resources.infosecinstitute.com/website-hacking-101/
To view Part II of the article series, please open: http://resources.infosecinstitute.com/website-hacking-101-part-ii/
In this part of the Website Hacking 101 series, […]
So far, we have discussed techniques used in manipulation, the characteristics that social engineers possess, the cycle of social engineering, and the four main qualities that are abused in […]
In the first part of this article, we are going to discuss the psychology surrounding social engineering, and in particular, the four qualities that social engineers abuse and […]
Approaches to Information Gathering in Physical Penetration Testing – Part I: Gathering Information via Photography
The first phase of an attack, and in a security assessment, is to gather as much data on the target as possible. It is actually considered one of […]
In this article, I’m going to focus on prefetch files, specifically, their characteristics, structure, points of interest in terms of forensic importance, uses, configuration, forensic value and metadata.
For Part I of these series, please visit this page: http://resources.infosecinstitute.com/windows-systems-and-artifacts-in-digital-forensics-part-i-registry/
This article begins with event logs and discusses their headers’ structure and the structure of their building blocks—the headers […]
Learning about artifacts in Windows is crucial for digital forensics examiners, as Windows accounts for most of the traffic in the world (91.8 of traffic comes from computers using […]
Below, we will discuss the reasons that incited people, businesses and governmental agencies to employ web tracking, detailed and basic methods of avoiding web tracking, and various types […]
For Part I, which discusses Mass Phishing and which sets the objects of examination in this paper, please check here.
For Part II, which discusses Targeted Phishing, please check here.
For Part I, which discusses Mass Phishing and sets the objects of examination in this paper, please check http://resources.infosecinstitute.com/phishing-techniques-similarities-differences-and-trends-part-i-mass-phishing/.
Spear-phishing is a technique by which a cyber-criminal falsely presents himself […]
The term “phishing” actually originated from the word fishing because the manner of attack defined by the term resembled fishing ever since its early invention. Namely, the criminal sets […]
Facebook malware: How do they work, how to protect yourself against them and what to do if you get infected
Social media’s history precedes the 21th century and ever since then malevolent people have attempted to infiltrate the computers of innocent people using these media in hope of […]