Investigating Malware Using Memory Forensics – A Practical Approach

Monnappa K A  |  Information Security Investigator, Cisco SystemsLocation:  Roselle Junior Ballroom 4610Date: Thursday, March 28 | 3:30pm-4:30pmFormat: 50-Minute BriefingsTracks:  Data Forensics/Incident Response,  MalwareThe number of cyberattacks is undoubtedly on the rise targeting government, military, public and private sectors. Most of these cyber attacks make use of malicious programs (Malware) for financial theft, espionage, intellectual property theft, and political motives. These…

how bitcoin works

Bitcoin – The Cryptocurrency Explained

Cryptocurrency, as the name suggests, are currencies which are generated by computer codes, thus it has no issuing agency. Any cryptocurrency is generated by ‘miners’ on a cryptocurrency network like bitcoin that solves complex mathematical problems. Bitcoin is the name of the oldest and most popular cryptocurrency network as well as the unit of currency…