This article explains how a disk image can be taken from a virtual machine running on the public cloud. The acquired disk image can then be used with offline forensic tools like Autopsy and Encase.
Due to the strict COVID-19 policies in Australia, the BSides Canberra hacker conference was back in mid-April 2021. My visit was a good excuse to take my pwnagotchi for a walk in Canberra, and draw some conclusions of the Wi-Fi security practices of the Australian capital city.
For those not familiar with the pwnagotchi project, it makes Wi-Fi password auditing fun again. A pwnagotchi device is essentially bettercap installed on a Pi Zero, allowing to capture Wi-Fi packets on the go. The captured Wi-Fi packets are automatically uploaded to third-party services, and then analysed to reveal weak wireless passwords (PSKs) of the nearby wireless access points.
In a competitive environment, it is essential to maintain a professional image to your customers, suppliers, and even to your competition. Our latest article features the main benefits of having an IT provider manage your email service.
Why is it so that SMBs are so vulnerable to technology issues? We explain what the leading IT and cybersecurity risks of any small business are, and how a managed IT services provider can help business owners address them.