Hiển thị các bài đăng có nhãn security. Hiển thị tất cả bài đăng
Hiển thị các bài đăng có nhãn security. Hiển thị tất cả bài đăng

Thứ Năm, 25 tháng 4, 2019

5G-NR False Base Stations (Part 2)

Going forward with further discussions about FBS (false base stations) considering detection and prevention approaches that can be taken to act as a deterrent against them or their use; it is inescapable thus unavoidable that readers need to be aware of the meanings of abbreviations and definitions adopted for 5G and the reason for my trewmte blog look-up reference. This doesn't suggest you

Thứ Hai, 22 tháng 4, 2019

5G-NR False Base Stations (Part 1)

This is my first technology post for a while at trewmte blogspot as my time in research now extends to 5G-NR; network investigations; connected cars and autonomous vehicles; drones; in addition to existing digital forensics, smartphone examinations and cell site analysis. I have a number new insights and revelations for readers this year about the aforementioned subjects. So I will be more active

Thứ Tư, 28 tháng 6, 2017

IM Telegram Replay Attack - Android

Hopefully, readers will have had the opportunity and time to read about WhatsApp here at the trewmte.blogspot:

WhatsApp network forensics - http://trewmte.blogspot.co.uk/2017/06/whatsapp-network-forensics.htmlWhisper Signal WhatsApp - http://trewmte.blogspot.co.uk/2017/06/whisper-signal-whatsapp.html

So it's time to move on to the next instant messaging app known as Telegram. It is relevant to

Chủ Nhật, 19 tháng 6, 2016

Learning from Posters Pt2 - Forensics, Cyber and Security

Part 2 -  Continuing on from Part 1 showing the collection of learning from posters which I thought it would be helpful to the community to have them posted in a single location.

Learning from Posters Pt1 - Forensics, Cyber and Securityhttp://trewmte.blogspot.co.uk/2016/06/learning-from-posters-pt1-forensics.html

























































Learning from Posters Pt1 - Forensics, Cyber and Security

Part 1 - I have been collecting these learning from posters which I thought it would be helpful to the community to have them posted in a single location.

Learning from Posters Pt2 - Forensics, Cyber and Securityhttp://trewmte.blogspot.co.uk/2016/06/learning-from-posters-pt2-forensics.html























































Thứ Bảy, 21 tháng 11, 2015

BYOD - CJIS MOBILE APPENDIX - FBI

Bring Your Own (BYO) what?

Take away the scenario of government and local authorities involvement and merely consider private industry then the latter may have no enforcement rights to control BYOD (bring your own device) smartphone usage as these employees and out-source workers are being used and are paying for company communications out of their wages/salary merely so that a natural business

Thứ Ba, 11 tháng 8, 2015

BYOD: Cyber Classification

Having an effective Cyber defence requires " identification " of the methodology proposed for each measures adopted in the Critical Security Controls (CSC) programme. The Critical Security Controls listed below has been developed from the combined knowledge of actual attacks and effective defences of experts from every part of the cyber security ecosystem.

CSC 1: Inventory of Authorized and

Popular Posts

Được tạo bởi Blogger.

Featured Post

Portland Man Pleads Guilty to Cyberstalking and Anonymous Telephone Harassment

PORTLAND, Ore.—On June 24, 2019, Bob Ibenne Ugwa, 50, of Portland, pleaded guilty to cyberstalking and anonymous telecommunications harassme...

Nhãn