archive
Date: May 2015

2015/05/30

Cool News Story Bro! Week of 05-29-2015

by Otakun
Categories: News
Tags: No Tags
Comments: Leave a Comment

Hello, Hello, Another news week is here, and it’s the last one for the month and we got some good stuff as usual. So let’s not delay and get right into it. Watch Out! This Boobytrapped Text Message Will Turn Off Your iPhone The first story of the week is a fun one. Apparently a[…]

2015/05/23

Cool News Story Bro! Week of 05-22-2015

by Otakun
Categories: News
Tags: No Tags
Comments: Leave a Comment

Why Hello There! Another news week to wrap up, a bit slower than usual but still have some good stuff. So let’s get to it. The Logjam Attack: What You Need to Know First story of the week brings news of another TLS vulnerability. This one is called “logjam” and is similar to the “FREAK”[…]

2015/05/19

Office and OLE File Forensic Analysis Primer – 1

by InterDimensional_Shambler
Categories: Analysis, Malware Reverse Engineering
Tags: No Tags
Comments: Leave a Comment

Office and OLE File Forensic Analysis Primer Warning! Actual malware will be executed following these instructions, use caution and a sandbox with NO INTERNET. This is the Office and OLE File Forensic Analysis Primer. It’s intended to get from: “How do I analyze an office file?” To “Hey I can tell the difference between a[…]

2015/05/16

Cool News Story Bro! Week of 05-15-2015

by Otakun
Categories: News
Tags: No Tags
Comments: Leave a Comment

Hey All! Another busy news week is upon us, got some interesting stuff as usual so let’s get going! New GPU-based Linux Rootkit and Keylogger with Excellent Stealth and Computing Power First story of the week is about a few pieces of “Proof of Concept” malware that runs ont he GPU instead of the CPU.[…]

2015/05/09

Cool News Story Bro! Week of 05-08-2015

by Otakun
Categories: News
Tags: No Tags
Comments: Leave a Comment

Hey Guys, Another news week is here, and it’s a bit slow but still got some good stuff for your reading pleasure. So off we go! Messaging Application LINE Used as a Decoy for Targeted Attack First story of the day is of a new targeted campaign that’s levering the popular messaging app LINE in[…]

2015/05/05

Network Forensics – Round 3: Ann’s Apple TV

by DFIRninja
Categories: Analysis, Network Forensics
Tags: , ,
Comments: 1 Comment

: Network Forensics Round 3! : Ann’s Apple TV Below is the scenario for round 3 in the network forensic challenge series: Ann and Mr. X have set up their new base of operations. While waiting for the extradition paperwork to go through, you and your team of investigators covertly monitor her activity. Recently, Ann[…]

2015/05/02

Cool News Story Bro! Week of 05-01-2015

by Otakun
Categories: News
Tags:
Comments: Leave a Comment

Hey Guys, Decent amount of news to get to this week so let’s just dive right into it. Enjoy! 25 members of $15 million carding gang arrested in Romania First story of the week, by Naked Security, is some feel good news unless you are one of the criminals arrested. It looks like a fairly[…]


Today is Saturday
2017/06/24