Tag Archives: Data security

Eraser – Tool to Wipe Sensitive Data

During the incident response and analyzing artifact in memory the responder will copy the data to external hard drive and this may include sensitive information that will be processed during the work. before starting to use external hard drive it

SXSW Spotlight: The Security Side of Wearable Tech

With the Apple Watch set to storm the smartwatch market in April, the security implications of new wearable devices will be the focus of a workshop at this year’s SXSW Interactive. Under Secretary for Science and Technology Dr. Reginald Brothers

Will 2015 Data Security Be Different Than 2014?

The year 2014 will be remembered for sensitive security breaches with hacks against Sony Pictures and leaked photos of high-profile entertainers from Apple’s iCloud. These data breaches have caused many people to question online security and if it can be

ExifDataView Utility To Check Image EXIF Data

CCTV and video surveillance systems are installed on every modern organization this comes as a physical security measure to record any security restriction at any point of the company.  But on the other hand this can make organization open to

DBAN Hard Drives Wiping Utility

Data and files stored on your hard disk may contain a very sensitive information , previous study conducted by Researchers from BT and the University of Glamorgan  demonstrated at which point reputable organization do not care about data security. Researchers

OneSwarm a secure P2P file sharing utility

Peer 2 peer is a widely used protocol that help in sharing and connecting nodes on internet, I think any person in the past used all sharing programs such as Bittorrent , kazaa or napster which allows to exchange files

Secret Disk Application to Hide Personal Data

Protecting information from unauthorized access or destruction is very important. from the technical point of view this is possible using special security settings and applications, there is a very interesting solution called Secretdisk that do not use any encryption but