Categories
cybersecurity

Android Incident Response Lab 1

Introduction Incident response is often described as a 6 step process. These 6 steps help an organisation formulate a plan for responding to cyber security incidents and help keep future incidents at bay. During this lab, we focus on some simple techniques to triage key Android logs to help investigate the depth of a compromise […]

Categories
cybersecurity stalkerware

New Stalkerware 'Mobile Tracker Free' Targets Victims

How Mobile Tracker free stalkerware works, how to detect it and how to remove it.