Is Calyx OS a good choice for enhancing mobile security?
Is Calyx OS resistant to mobile security hacks?
Continue reading Is Calyx OS a good choice for enhancing mobile security?
Collaborate Disseminate
Is Calyx OS resistant to mobile security hacks?
Continue reading Is Calyx OS a good choice for enhancing mobile security?
Is Calyx OS resistant to mobile security hacks?
Continue reading Is Calyx OS a good choice for enhancing mobile security?
Using a USB memory stick that was frequently used on a Trojan-infected PC on an uninfected offline Windows 10 PC. Physically, the PC has no wireless adapter, so it cannot be connected to wifi. Bluetooth is present but disabled in the devic… Continue reading Will Remote Access Trojans work on an offline PC?
I’m asking a forensic company,I think the infected malware is a Trojan horse.
When the harassment took place, the forensics engineer had a Surface layer (look at the executed program, as you can see in Process Hacker) nothing. As you can s… Continue reading where are the traces of malware and remote control? [closed]
I’m thinking of using Suricata or Snort.
I can’t do anything myself, so I’m going to ask a freelance security engineer to do it.
If the engineer is skilled, once suricata or snort is set up, will it work fine in one setup?
at the moment,th… Continue reading What kind of engineers should I look for to implement Suricata or Snort?
I had a security engineer analyze a packet capture from my machine.
About five IPs were used in an attack. It was the only IP (6) that was detected multiple times by VirusTotal.
The IP is 209.197.3.8. Four months ago, this IP was a Microso… Continue reading Is it possible to attack using a CDN as a cover?
A security engineer told me that my computer must have a trojan horse, but it has not been found yet.
The security engineer captured and analyzed traffic pcap files with Wireshark, and said that there was a problem in the pcap file.
The se… Continue reading Does wireshark detect all unauthorized access?