AVM Technology, LLC

  • Increase font size
  • Default font size
  • Decrease font size
Security and Forensics Articles

End of 2012 in Cyber Forensics and InfoSec

E-mail Print PDF

As a leading computer forensics company, we were busy in 2012.  Our practice included assisting attorneys, businesses, and individuals in issues involving the analysis of digital evidence.  Some of the computer forensics matters we were involved in included civil cases, criminal matters, business disputes, and incident response.  We also saw a dramatic increase in matters requiring the forensic analysis of mobile devices.  We also testified as computer forensics experts in matters involving digital evidence. 

In 2012, AVM Technology's clientele continues to broaden, we assisted small law firms in cases involving criminal defense and also assisted some of the largest law firms in Virginia in cases involving the investigation of potential employee misconduct.  We also assisted large IT businesses and small businesses with issues involving litigation and forensics incident response.   The year 2013 promises to be another great year for the field of computer forensics.

On the InfoSec front, we saw many developments.  The year even ended in some serious vulnerabilities exposed, for example the Internet Explorer zero-day flaw that can be exploited by hackers made headlines. In 2013, AVM Technology will continue growing our forensics and InfoSec practices, bringing the best and most qualified personnel to continue serving our clients in our home State of Virginia and throughout the United States.


Link Scams Continue

E-mail Print PDF

Link click scams continue to cause trouble for many computer users and present security threats to many businesses and organizations.  The way this works is that an individual would send a link to prompt the recipient to click on it.  Once clicked, the target computer will download malware.  This will happen without the computer owner's knowledge and often without leaving a trace.  The most sophisticated code can mutate to avoid virus protection programs, which are pattern based.  We have seen this situation in banking, emails, social networking and many others.  The bottom line is that once the link is clicked, the attacker "owns" the target machine.  The video below explains some of this, in this case from the angle of a fake pizza order.  Once the user cancels the fake order, the attacker owns the machine and all information in it.  This is a major security threat to businesses.


October 2012 Computer Security Update

E-mail Print PDF

This month in computer security news, we had some interesting happenings.  Some of these included the flame virus, which is believed to be part of a cyberwarfare effort against Iran was developed as early as 2006 and is linked to at least three other malware programs.  We also saw Microsoft Corp claim that is has fixed a security bug in Internet Explorer that hackers exploited to attack some customers.  In the cyberwar front, Iranian hackers have repeatedly attacked Bank of America Corp, JPMorgan Chase & Co and Citigroup Inc over the past year as part of a broad cyber campaign targeting the United States, according to people familiar with the situation.  Speaking of vulnerabilities, the Samsung Galaxy phones were found to be, well, vulnerable.  The medical front brought us the troubling news that high-risk medical technology has been found to be infected by computer viruses and malware.  And also in the medical arena, hackers may be able to control pacemakers from several manufacturers, making them capable of delivering a deadly, 830-volt shock.  Finally, six years after a breach, the Department of Veteran Affairs is yet to install encryption software in many of its computers.  October was a busy month in the security front.  For more details about these news, you may visit http://www.cyberhacker.org.