Chuyển đến nội dung chính

WhatsApp network forensics

With many companies allowing employees to use their own smartphones in the workplace it has been noted confidential information maybe being unwitting leaked as users take to using their smartphone cameras to take photos of Whiteboard content, potentially risking disclosure (mentioned by the Information Security Community). Smartphones can also scan data, reducing the need for organisation to

Nhận xét

Popular Posts

Coding and Kids

I did it.  I made the leap into robotics.  I was terrified to fail.  I kept putting it off-finding reasons that I couldn't make it work right now. But, the kids asked about when the robots were coming.  So, I jumped.  And I regret nothing. I do not know how program or code.  At all.  But, the good thing is that code.org and sphero and other coding groups know this.  They have your back.  They have created lesson walkthroughs for the teacher, or you can just show the tutorials to the students and have them follow along.  I relied on that and the fearlessness of my students.  We had a blast as learners together. Ok.  I am sure you know about the Hour of Code.  And I am sure some of you are on the bandwagon. But, I have an idea that some of you hear it and think--not one more thing.   I can't do one more thing. And I hear that.  I am a classroom teacher, but I promise once you try it, it will remind you why you beca...

iPhone factory reset bars access to revevlation

It has been known for sometime there is no general release that can handle the deleted encrypted data on iPhone 4s onwards.  The latest article in the The Register ( http://www.theregister.co.uk/2014/05/01/thanks_for_nothing_apple_say_forensic_security_chaps/ ) rehearses discussion the forensic community has already had about deleted keys and deleted encrypted data. The factory reset point merely