My new column is out in Hakin9 magazine. It was 2 months overdue so it is a relief that it is finally published.
An excerpt of it in the "Tool Time" column this month.
"Since the issue 7/2010 article Prey: A new hope, there have been developments in the device tracking tool. It has been enhanced to now be able to monitor lost Android smartphones and tablets when activated. There was a reported case in May 2011 where a Californian harnessed evidence collected from a similar tool, Hidden, to recover his stolen Macbook."
Subscribe to:
Post Comments (Atom)
VM for ransomware investigations
My laundry list of tools/software useful when investigating ransomware cases. Tor: Obviously need this to access Onion sites. qBittorrent...
-
This annoying message popped up after I ran the update in avast! in Ubuntu yesterday. avast! crashes every time I attempt to launch it after...
-
Downloaded a sample of "Zbot" from Offensive Computing's site . I'm no reverse engineering guru but decided to give it a ...
No comments:
Post a Comment