Data recovery April 24, 2015 Srinivas HTML5 Security: Local Storage In a previous article of mine, I discussed Cross Domain Messaging in HTML5. This article walks you through another feature, called local storage, and its security. Local...
Data recovery March 23, 2015 Ashiq JA Digital Dark Age: Information Explosion and Data Risks "Old formats of documents that we've created or presentations may not be readable by the latest version of the software because backwards compatibility is...
Data recovery February 19, 2015 Ali Qamar Clean up Your WordPress Site after Hack and Secure it against Future Threats WordPress is the most popular CMS (Content Management System) available nowadays online, used by the vast majority of all sites. If you have a look at this...
Data recovery September 12, 2014 Infosec Encryption of Cloud Data Organizations seeking to protect sensitive and mission-critical data quickly realize that there is no single answer to keep all systems completely secure....
Data recovery July 9, 2014 Security Ninja Data Loss Prevention (DLP) Strategy Guide In this article, we'll learn about the concept of data loss prevention: why it is needed, what are the different types of DLP and its modes of operations, what...
Data recovery June 9, 2014 Jeremy Martin Hard Drive Head Stack Replacement Demo – Data Recovery Data recovery has been needed since man started to write things down. Why? Because what ever medium they tried to store the data on, it has always been susceptible...
Data recovery December 17, 2013 Infosec Business Continuity & Disaster Recovery Within a business continuity plan exists a few steps: Business Impact Analysis (BIA) This involves determining the operational and financial impact of a potential...
Data recovery December 9, 2013 Dimitar Kostadinov Shadow Network Part I I. Introduction Similarly to the real real-life situation where a GhostNet report is followed by the one on the Shadow network, these articles come as...
Data recovery September 24, 2013 Ivan Dimov Windows Systems and Artifacts in Digital Forensics, Part I: Registry Learning about artifacts in Windows is crucial for digital forensics examiners, as Windows accounts for most of the traffic in the world (91.8 of traffic comes...
Data recovery August 26, 2013 Pierluigi Paganini Databases—Vulnerabilities, Costs of Data Breaches and Countermeasures This post introduces principal database vulnerabilities, providing an overview of the possible effects for their exploitation. For each database vulnerability,...