Some stuff about security..

DISCLAIMER: This blog is a set of personal notes I have decided to make public. Please, ignore any typo or language error

Monday, February 29, 2016

Acercard Mobile Trojan: its root exploits and its debugging messages

›
A few days ago Kaspersky wrote in its blog about the evolution of a bank trojan for Android named Acerard  ( https://blog.kaspersky.com/acec...
Thursday, February 25, 2016

System, Memory and Network Forensic Analysis with Log2timeline and Splunk (part 2)

›
In my last post, " System, Memory and Network Forensic Analysis with Log2timeline and Splunk " I explained the steps to create a s...
Wednesday, February 24, 2016

System, Memory and Network Forensic Analysis with Log2timeline and Splunk

›
In order to understand an intrusion chain sometimes it is necessary to deal with a a lot of information from different sources at the same ...
‹
›
Home
View web version
Powered by Blogger.