Posted by: NuVida Data Forensics | October 14, 2010

“Free Public Wi-Fi” Will Cost You

Anyone with the Windows XP operating system should be aware of a new expliot that sets up a fake wireless network called “FREE PUBLIC WI-FI.” While the unsupected individual finds this free hot spot and clicks on it, the computer is redirected and connected to another computer. This connection will allow individuals access to your data.

Read more:

Posted by: NuVida Data Forensics | September 26, 2010

Did you update your anti-virus today?

On September 9, 2010, a new malicious computer virus was spreading through E-mails. Named “Here you have” virus was linked to a cyber-jihad group called Brigades of Tariq ibn Ziyad. This virus was able to crash systems and had the ability to allow remote access from the infected computers to a computer that uses the Tariq ibn Ziyad name. Further intelligence indicates Tariq ibn Ziyad’s objective is to “penetrate U.S. agencies belonging to the U.S. Army.”

Read more:

Posted by: NuVida Data Forensics | September 26, 2010

What information do you store on your cell phone or computer?

As technology revolves, we depend on our computers, laptops, cell phones and game units such as the X-Box, PS3 and Wii. With the digital information that is stored on these devices had helped law enforcement be able to extract evidence on various crimes – the BTK serial killer and the terrorists responsible for the Madrid train bombing. Information as what websites the user has accessed, E-mails, and files have been downloaded or deleted can help in the investigation.

Read more:

Posted by: NuVida Data Forensics | September 23, 2010

Is the real you on Facebook?

Facebook like just about anything else can be hacked or false accounts can be created. This article shows several stories about people on Facebook who have become victims of either their accounts being hacked or fake accounts being created under their name.

The first story about an Orlando Commissioner who had a fake account created in her name using an old photo and posting legit information shows how anyone can make an account. It also shows that when you put photos of yourself out on the Internet anyone can use them even if they are secured to an extent. For instance in MySpace you can put a lock on your photos so no one can right+click on your photo to save it, but that doesn’t mean they can’t use a third party program such as Snag It to copy the photo. The Commissioner had contacted Facebook to have the account taken out and a several months later another account was created. When it comes to hacking a Facebook page someone could use simple social engineering tactics or even a Keylogger to find out your E-mail such as a co-worker as show in this article. Once they have your login just as your E-mail account – that’s the first step. Once the password is cracked, they have access to your account. Most people tend to use the same password on almost every account, in this article you can see that when the woman hacked the account she redirected the E-mails to a separate E-mail account essentially giving her any information she needs.

Read more:,0,5093413.story

Posted by: NuVida Data Forensics | September 19, 2010

Who else is listening to your cell phone conversations?

With our busy schedules we tend to keep in touch with others more offend by calling and chatting on the phone. Can you imagine having someone else being able to hear some of your private conversations? With a $1,500 dollar device some can intercept your phone calls. At this year’s Def Con Conference a demonstration was put on using a device that cracks GSM (Global System for Mobile Communications) encryption that tricks phones into thinking it’s a cell phone tower and routing calls through it. GSM is also known as 2G. Cell phones that use 3G use SIM cards like an iPhone you would think would be safe. But with this device it actually jams 3G and forces the phone to automatically search for a 2G GSM signal allowing the device to still work. With this device (not being named in the article) criminals could have easy access to someone’s phone calls. So the current security features on phones have been broken.

 Read more:

 Watch Demo:

Posted by: NuVida Data Forensics | September 18, 2010

Can Wi-Fi be safe? Free connection to the Internet can cost you in the long run.

We secure our valuables whether by placing them in a safe or installing locks to prevent intruders from stealing them.  Now why can’t we do the same for our information we store in our computers.  Here is an article about a man who went to a location like Starbuck’s that has free Wi-Fi and got his computer hacked. Someone at the “Starbucks” sniffed his password and gained access. By gaining access they compromised several social sites that he visits. This is just showing how dangerous it is to use weak security practices like having a weak password. If Igor had company information it would’ve been compromised. I’m assuming once the hacker gained access he used a Keylogger or a Trojan.

Read more:

Posted by: NuVida Data Forensics | August 1, 2010

Do you know what your children are doing on the Internet?

As a parent, one tends to provide and teach the best for their children. As a child grows, one expects them to make decisions or think about the consequence regarding their decisions. Do you know what your children are doing on the Internet? In the past few weeks a young girl had posted an offensive video on YouTube, YouTube is a popular website that Internet users visit to view and upload videos.

This story was started by a rumor that this 11 year girl was involved with an adult, who is a lead singer of a band, called Blood on the Dance Floor. The young girl created a video in which she calls out “haters.” Users on retaliated and began to harass her, after receiving threats the young girl was placed under police protection. These types of situations are now being seen more often then you know. Individuals, such as young adults, do not understand the consequence their actions come with.

Don’t talk to strangers or be sure to look both ways while crossing the street are types of advice that parents say to their children to keep them safe on the street. Now how can one keep our children safe from people on the Internet?

Here are a few recommendations:

  • Keep the computer in a common area such as the living room
  • Computer usage only when parental supervising is available
  • No video cameras allowed
  • Parent must know E-mail accounts, Instant Messaging accounts and passwords
  • Discuss how dangerous posting pictures or streaming video with strangers
  • Check what website your children visits

Read more:

« Newer Posts