Meltdown and Spectre Threat Continues

The roller-coaster that is Meltdown and Spectre has been a unique ride, and doesn’t appear to over. But there is more to take away from this story than a prolific vulnerability. The security world stood in shock and awe early this year as news of Spectre and Meltdown began circulating.  … Read More

North Korea Turns to Cryptocurrency

The government of North Korea has, over the last few years, been largely cut off from the global economy due to their civil rights abuses, intercontinental ballistic missile launches, and nuclear weapons development. To attempt to feed their starving population and maintain control, they’ve now turned to hacking cryptocurrency. The … Read More

Zyklon Malware Resurgence

FireEye recently reported a resurgence of the Zyklon HTTP malware, which leverages three new vulnerabilities in Microsoft Office.  This sophisticated malware, originally detected in early 2016, has been observed targeting telecommunication, insurance, and financial service industries through spear phishing attacks.  Once a host has been infected, Zyklon conducts command and … Read More

Lebanese Hacking Continues

A state-sponsored hacking group called the Dark Caracal, linked to the Lebanese government, has an ongoing attack effecting desktops and Android. They have been found to be engaging in cyber espionage and data theft against 21 countries or more.  They have stolen hundreds of gigabytes of personal data. Their attacks … Read More

Recovering from BitPaymer Ransomware – Part 2

This is part two of a special report on the effective recovery from a BitPaymer ransomware attack, including data recovery without paying the ransom. Part one:   The BitPaymer Infected Server: The client presented after the expiration for the ransom demand and well after the malware had spread to … Read More

Cryptocurrency: Why Lost or Stolen Coins Must Be Documented

As the rise of the popularity of cryptocurrency barrels toward a paradigm shift in the economy, some traditional issues, as it relates to crypto being an asset, begin to surface. This includes the implications of your responsibilities when that asset is stolen or otherwise lost and unrecoverable. In 2014, the … Read More

WannaCry: Harbinger of New Threats

For the last several months, the entire world has been under attack by hackers. This statement isn’t new because the same statement was true a month ago… a year ago… a decade ago. The Internet went from a government controlled entity to public access status in the early 1990’s. It … Read More

Self Sabotage

Cases involving estranged or divorced spouses are always delicate. The situation only escalates when one of the parties worries the other is spying on them to gain leverage. Our forensic expert Brett handled a case involving a client who was convinced their estranged spouse put spyware on their mobile devices. … Read More

Do’s, Don’ts & Common Sense of Cyber Security

In the face of unrelenting reports detailing computer hacking and cybersecurity incidents, many allow the overwhelming nature of it all to lead to inaction.  Luckily, many solutions exist that can make your organization, computers and network more secure.  In order to de-mystify the realm of cybersecurity, we’re providing some basic … Read More