Cyber threats aren’t just a problem for large shipping organizations, small maritime fleet operators are also at risk. Anything from phishing emails to ransomware attacks, these threats can disrupt ...
Related to my last post which detailed forensic techniques for recovering data in smart watches, this post looks specifically at Garmin watches. This time, we’ll explore how data can be accessed much ...
Use asymmetric ECC ciphers to encrypt video footage on body worn cameras using the public key. Once recovered onto a central server and decrypted using the ECC private key, symmetric AES keys can be ...
The SOYES S7, also referred to as the SOYES 7S for added confusion, is a discontinued mini phone. It only supports the 3G cellular network, has a 2.5-inch screen (that’s 6.4 cm in modern units), 8 GB ...
GPS is one service in the Global Navigation Satellite System (GNSS). Others include Russia’s GLONASS and the EU’s Galileo constellations. These are all used to provide Position, Navigation, and Timing ...
AI-generated documents, videos and more pose significant challenges for DFIR DFIR teams can harness innovative detection strategies and tooling Digital fingerprinting and watermarking, AI-powered and ...
We’re only as good as the people in our team, so we’re always looking for great people. Maybe that’s you? PTP is acutely aware of the lack of diversity in our industry, and are keen to address that.
IASME recognises Pen Test Partners as a Cyber Essentials certifier; something we’re very pleased about. By working with us you can achieve Cyber Essentials scheme status with a minimum of fuss and ...
Done properly digital forensic (DF) investigations save your business time and money. Devices provide a wealth of evidence sources that can be used to prove or disprove facts. The aim of DF is to ...
As security is a process not a product, security training should never be commoditised. That’s why we deliver bespoke security training to all levels, from absolute novice users through to CISOs, ...