My latest column on ensuring endpoint privacy using secure deletion. Here is the excerpt.
"The Internet has empowered us to do more with our electronic devices. We
do everything from our taxes to shopping and sending private messages.
Our devices become a hotbed of personal data that is of interest to
malicious parties. Deletion of files and caching is insufficient in
preventing harvesting of your information that resides on your devices.
The solution is secure deletion or wiping to overwrite those files with
random data to eliminate the chances of data recovery."
Subscribe to:
Posts (Atom)
VM for ransomware investigations
My laundry list of tools/software useful when investigating ransomware cases. Tor: Obviously need this to access Onion sites. qBittorrent...
-
This annoying message popped up after I ran the update in avast! in Ubuntu yesterday. avast! crashes every time I attempt to launch it after...
-
Downloaded a sample of "Zbot" from Offensive Computing's site . I'm no reverse engineering guru but decided to give it a ...