The impact of DoS (Denial of Service) cyberattacks on a Local Area Network (LAN)

|

In this paper I will highlight a modus operandi of hackers launching Denial of Service (DoS) cyberattacks. I will theoretically show how CAM Overflow and TCP SYN Flood attacks can be performed, using Kali Linux, a Linux distribution used by … Read More

Printed edition of the book ”Beginner’s Guide for Cybercrime Investigators”

|

It has been published the printed edition of the book ”Beginner’s Guide for Cybercrime Investigators” Pages: 103, Binding: Paperback, Interior Color: Black & White, Dimensions: US Trade (6 x 9 in / 152 x 229 mm) Lulu Press: https://www.lulu.com/shop/nicolae-sfetcu/beginners-guide-for-cybercrime-investigators/paperback/product-1mw7zdp9.html In … Read More

Report on Big Data & Data Analytics in Homeland Security Market

|

The use of big data and data analytics by Homeland Security, Public Safety organizations and Intelligence agencies is on the rise, mostly because the world is becoming more digital and connected. This is creating new opportunities, not only for data … Read More

EU citizens want a higher level of privacy protection

|

A large majority of the 27,000 respondents to the Eurobarometer survey say that the privacy of their personal information, their online communications and their online behaviour is very important. In particular: More than seven in ten (72%) state that it … Read More

Take care of a new Facebook Messenger malware

|

In accordance with CheckPoint, the ransomware visrus is also present on LinkedIn. Usually, the computer is infected by a download of a .svg image that redirect to a video requiering tu install a pseudo-extension needed to rule the video. A … Read More

Denial of service

|

A denial-of-service (DoS) attack is any of certain forms of malicious damage to computer systems. The aim of such an attack is to prevent legitimate users from accessing their services. A DoS attack is generated in a number of ways. … Read More

Fork bomb

|

The fork bomb is a form of denial of service attack against a computer system. It relies on the assumption that the number of programs and processes which may be simultaneously executed on a computer has a limit. A fork … Read More

Computer bugs

|

(Photo of first computer bug.) A computer bug is a fault in a computer program which prevents it from working correctly. Bugs arise from mistakes in either a program’s source code or its design. It is said that there are … Read More

Buffer overflow

|

A buffer overflow is a type of computer bug. When the length limitation of a space reserved for data – a buffer – is not properly enforced, a buffer overflow may occur. Input data is written to the buffer and, … Read More

Blue screen of death

|

The so-called blue screen of death, also abbreviated as BSoD, refers to the screen displayed by Microsoft’s Windows operating system when it cannot (or is in danger of being unable to) recover from a system error. There are two Windows … Read More

Code of Ethics for Cybercrime Investigators

|

(Source: International Association of Computer Investigation Specialists) Maintain the highest level of objectivity in all forensic investigations and present the facts correctly;   Examine and analyze in detail the evidence;   Examine in compliance with established principles and validated by … Read More

Procedures model for the forensic examination of computer systems

|

(Source: International Association of Computer Investigation Specialists) Hard disk examination Sterile conditions are established in terms of crime. All storage media used during the examination are prepared recently, cleaned of extraneous data, anti-virus checked and tested before use;   All … Read More

1 2 3 4 8