- Malware Analysis Process Monitor Filters for Malware Analysis and Forensics
Process Monitor captures enormous amounts of data that can overwhelm analysts. Custom filters help by hiding boring entries or highlighting interesting events. Downloadable filter sets look for...
- Incident Response How to Get into Digital Forensics or Security Incident Response
Employers rarely invest in growing beginner forensics analysts, so individuals must build relevant skills within current roles. System admins can learn incident investigation tools, network admins...
- Incident Response How a Data Security Breach Can Be Used for Good PR
Hershey turned a website breach into positive PR by emphasizing that the attacker only modified a single baking recipe. Headlines focused on the quirky detail rather than consumer data exposure....
- Social Engineering Similarities Between Riots and Modern Internet Hacktivism
Decentralized hacking groups operate without formal leadership, yet they coordinate like mobs in a riot. De-individuation, instigating events, and risk-taking 'entrepreneurs' drive both, and...
- Assessments 3 Reasons Why People Choose to Ignore Security Recommendations
People avoid information that challenges beliefs, demands undesired action, or causes unpleasant emotions—all common with security assessments. Recipients may resist findings that contradict "my...
- Malware Learn Better Security Breach PR from Harold Sun's Halfhearted Apology
Herald Sun's website was compromised to serve rogue antivirus, but their brief apology offered few details and underplayed the risk. Better post-incident communications require promptness, clarity,...