Tag Archive: cyber crime

Digital forensics

Geo-tagging is a key part of images that can be used in many cameras and programs in London these days.

Geo-tagging is where an image will retain a series of geographical details. This is used as additional details to make it easier for people to figure out what is in a listing as the information is being posted in some way or another.

Geo-tagging is a key to validating information and to see where items came from. Digital forensics London often entails the use of geo-tag forensics to find clues relating to criminal investigations among other critical functions.

This function is particularly convenient in cases when GPS technology is utilized. Many portable devices that take photos have GPS receivers that can take in data with geo-tagging in mind. Therefore, it should be relatively easy to figure out where an image has come from by taking a look at the latitude, longitude and altitude readings that came from any particular forensics readout. Still, not all devices are going to be all that direct with regards to finding or listing information on where something might have been located at a given time. Continue reading

Cyber CrimeMarch 20 specialists from the virus lab Eset found disguised newsletter spam messages, which tell about the situation with the tax on bank deposits of Cyprus.

We know that this topic literally blasted the media space, and gave ample ground for different speculations. Especially because at the time of Cyprus have not voted for the introduction of this tax (later it became known that the bill was rejected.)

“At the same time, we recorded the activity of the cybercriminals have also decided to use the situation in Cyprus and the hype around it for their own purposes. Attackers send letters on behalf of the BBC television with news headlines, designed to frighten the user and to convince him that a tax was approved in Parliament, “– says Artem Baranov, virus analyst Eset.

The letter contained a link, clicking on which the user is redirected to a page with a set of exploits BlackHole Exploits Kit, and then installing the Trojan Cridex (Win32/Cridex.AA). This program is usually used for theft of passwords and other confidential data. Continue reading

%d bloggers like this: