Profile cover photo
Profile photo
D3pɐk Kumar
Digital Forensics | Cyber Intelligence
Digital Forensics | Cyber Intelligence
D3pɐk's posts

Post has attachment

Sex toy maker ordered to pay over Sh300m for spying on customers through smart vibrators
A sex toy company has been ordered to pay a fine of over £3 million after shipping a "smart vibrator" that tracked customers' usage without their knowledge or consent. The We-Vibe 4 Plus is a £90 vibrator that connects to a smartphone app via Bluetooth, allowing the user's partner to operate the device remotely, from anywhere in the world. At the Def Con hacking conference last year, two hackers revealed that data from these devices was being sent back to Standard Innovation , the Canadian company behind the We-Vibe.
The hackers warned that this information was being stored on Standard Innovation's servers, along with personally-identifiable information such as email addresses.
The news coincides with a report from the National Crime Agency (NCA) and National Cyber Security Centre (NCSC), warning that internet-connected devices could be targeted by cyber criminals seeking to hold users to ransom over their personal data

Post has attachment

Well in this article going to focus on Cyber Security threats. As we know Ransomwares, DDOS, Mobile malware, Underground Hacking, Insider Threat are the major trending threats in few last years.

Organisations that have to consider measures against cyber war or cyber terror include governments, those within the critical national infrastructure, and very high-profile institutions. It is unlikely that most organisations will face the threat of cyberwar or cyber terror.


Post has attachment

One of the biggest forensic challenges when it comes to the mobile platform is the fact that data can be accessed, stored, and synchronized across multiple devices. As the data is volatile and can be quickly transformed or deleted remotely, more effort is required for the preservation of this data. Mobile forensics is different from computer forensics and presents unique challenges to forensic examiners.


Post has attachment

Digital Forensics & Incident Response is a multidisciplinary profession that focuses on identifying, investigating, and remediating computer network exploitation. This can take varied forms and involves a wide variety of skills, kinds of attackers, an kinds of targets.

The forms and policies posted on this page are publicly available on the Internet and are good sources of references, boilerplates, and go-bys. More to be added regularly. Legal Procedures and SoP varies with country to country.

A standard operating procedure, or SOP, is a set of step-by-step instructions compiled by an organization to help workers carry out routine operations. SOPs aim to achieve efficiency, quality output and uniformity of performance, while reducing miscommunication and failure to comply with industry regulations.


Post has attachment
+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Kenya : Hackers steal Sh 30billion from Kenya’s financial institutions Team arrested at least 11 suspects including of a former police officer who is also touted as an IT guru, Insiders…

Post has attachment

The ability to acquire and apply knowledge and skills : Intelligence

Post has attachment

The Pregnant Deer In a forest, a pregnant deer is about to give birth. Pregnant Deer Scenario : She finds a remote grass field near a strong-flowing river. This seems a safe place. Suddenly labour pains begin. At the same moment, dark clouds gather around…

Post has attachment
Sharing some references for study purposes   1 : SANS WHITEPAPER : 2 :CISSP Cookbook 3 : C3 Cyber…

Post has attachment
Training Roadmap
For more:

Post has attachment
Quick Look: Psychology of an Eastern European Cyber-criminal

Sharing one riveting stuff regarding criminal mindset. The usual conversation about Eastern European cyber-criminals does not differentiate them from criminals in other regions or address how they perceive the world differently.

#Cyber #Benjamins #cybercrime #Cybercriminal #Darkweb #DDOS #Deepweb #Exploit #ExploitKit #Flashpoint #RADAMANT #RSAC #RSAC2017
Wait while more posts are being loaded