Posted in Compliance on Apr 21st, 2007
When looking at the requirements for PCI DSS it is quite obvious that you need a more or less hack proof setup. This is all good and well but during the latest years changes has been done in how a hacker works. Now it is not only the operating system that is attacked but the […]
Read Full Post »
Posted in Computer Forensics on Apr 4th, 2007
Today I hade the great opportunity to have a very long talk with one of Microsofts malware investigators regarding how they work and what kind of routines they have. Sadly I am not allowed to say anything about the details but what I can say is that they have a very, very deep knowledge of […]
Read Full Post »