Cybersecurity Blog


Buckle Your Cyber Seat Belt

Posted on January 1, 2014 by Tom Mullins

A friend with a small business recently asked me why he should spend money on InfoSec, since his small business had never been breached or hacked. I thought...

Read More

Do-It-Yourself Cellular IDS is Here

Posted on July 26, 2013 by Sherri Davidoff, Author of "Network Forensics"

LMG’s researchers have created the world’s first proof-of-concept cellular intrusion detection system (CIDS), which will enable enterprise security professionals to detect hacked smartphones cheaply and effectively, even...

Read More

Join Us for Black Hat and DEFCON!

Posted on July 9, 2013 by Sherri Davidoff, Author of "Network Forensics"

Want to tear apart Android cell phone dumps and Blackhole Exploit Kit 2 infection traffic? LMG has been hard at work gearing up for network forensics Black...

Read More

Handy Protocol Cheat Sheet

Posted on June 5, 2013 by Sherri Davidoff, Author of "Network Forensics"

Since many of you asked, here’s the Network Forensics Protocol Handy Cheat Sheet that we use in the Network Forensics class. Jonathan Ham made the protocol charts....

Read More

Under the Hood: Banking Malware

Posted on May 26, 2013 by Sherri Davidoff, Author of "Network Forensics"

The phone rang. Two different companies had been hacked, both in the same way. One was a very large corporation, (we’ll call it “Worldwide Company, Inc”) which...

Read More

Dissecting RSA’s “Watering Hole” Traffic Snippet

Posted on May 6, 2013 by Sherri Davidoff, Author of "Network Forensics"

“Watering hole” attack. Every time I hear about it, I think of hippopotami– a nice change, actually, from the usual “viral” or “phishing/whaling” analogies. This afternoon I...

Read More

Compete to Win a Blackhat Black Card!!

Posted on June 20, 2012 by LMG Staff

Over at ForensicsContest.com we are running a puzzle called “Puzzle #10: PaulDotCom Goes Off the Air“.  It’s a great puzzle with a great story, and best of all...

Read More

Upcoming WebCasts for BlackHat and Tech Target

Posted on June 14, 2012 by LMG Staff

Live webcasts for BlackHat: Network forensics with Sherri Davidoff and Jonathan Ham http://searchsecurity.techtarget.com/Live-webcast-Network-forensics-with-Sherri-Davidoff-and-Jonathan-Ham Thursday, June 14, 2012, at 12:00 noon ET On the Internet, every action leaves...

Read More

Welcome to LMG’s New Blog

Posted on February 4, 2012 by lmgblogadmin

Do we have a cybersecurity blog, you ask? YES WE DO! We are pleased to announce the release of LMG’s Cybersecurity Blog! Here you’ll find new network forensics...

Read More