Forensic Examiner II InfoSec

Source: National Cyber Security – Produced By Gregory Evans Position Description -Works within Forensic Lab environment under ASCLD/Lab accreditation quality management system. -Conducts forensic analysis of digital evidence to include workstations, servers and mobile devices. -Works eDiscovery requests for electronically stored information (ESI) -Data analytics and review -Thoroughly documents The…

read more

He is special guest at the Ground Zero Summit 2015 being organised by Indian Infosec Consortium – a group of ethical hackers. “Threat to national security has moved to the digital dimension. Terrorist organisations have turned social networks and online forums into recruitment hotbeds and propaganda mechanisms. We need a security apparatus in the digital space to address this threat. Hackers are the face of this digital army.” The actor said he is bringing his whole team including scriptwriters of the show to observe and interact with the ethical hacker community. (Also Read: Tabu Has Shown Interest in 24, Says Director ) “From November 22, I will start shooting for 24. It will go on air in 2016. When an actor prepares for a role, we often start to live like the character. Some call it method acting. We meet real life people like the character and try to understand their nuances, their life,” he said. As per the summit’s website, speakers will share details of the espionage mission as well as hold sessions on hacking of cellular networks, medical devices in hospitals, using technical loopholes in them. The consortium claims to have discovered cyber espionage operation under which phones of Indian Army personnel, who had downloaded some mobile application related to news, had been compromised by hackers based in Pakistan. IIC CEO Jiten Jain has said that the findings were handed over to security agencies who promptly acted and sanitised the infected handset early this year.

Source: National Cyber Security – Produced By Gregory Evans He is special guest at the Ground Zero Summit 2015 being organised by Indian Infosec Consortium – a group of ethical hackers. “Threat to national security has moved to the digital dimension. Terrorist organisations have turned social networks and online forums…

read more

Top 5 #infoSec Reads June 23-30

by Matt Piscitello Snowden-inspired anonymity software, wearables security, remote control software for iOS and Android, Luuuk campaign affected by Tovar, and GoZ plays Lazarus are this weeks top 5 #infosec reads. Edward Snowden inspired anonymity software, OnionShare, launches Promising massive file sharing across the TOR network with complete privacy, Micah…

read more

WurldTech met the inabilities by infosec to GE

To overcome the inabilities of infosec, the GE has settled with Wurldtech to recover its in-house potential. The Wurldtech is the brand selling under the name of Achilles along with the test suite and firewall software. With the test tube suite, the hardware is designed to test the control system…

read more

NJVC and InfoSec Institute partner to provide cyber security training services

Top Priority Sector:  security_services Information technology solutions provider NJVC, of Chantilly, VA, and information security training company InfoSec Institute, have announced a partnership to provide cyber security training services. NJVC can now implement federal government and military formal training programs that fall under DoD 8570 training mandates. Homepage position:  1…

read more

Top 5 #infosec reads: February 17-21, 2014

by Matt Piscitello Wireless threat detection, exploiting routers to phish bank web sites, enterprise-ready iOS7, healthcare information protection, and mobile device management top this week’s list of infosec-worthy reads. The importance of live threat data Lisa Phifer discusses the importance of live threat detection and prevention. Lisa explains that while…

read more