Jean-François Legault, CISSP, CISA, CISM

Preying on Fear, Uncertainty, and Doubt: Cyber Fraud in an Economic Downturn

A look at what cyber fraud issues may arise in an economic downturn by employees who have been layed off or those that remain with fewer internal controls

Written By: Jean-François Legault, CISSP, CISA, CISM


SQL Injection Attacks

Used to read and modify sensitive data stored in a website's databse, SQL injection attacks operate by inserting malicious code that sites' database servers process.

Written By: Jean-François Legault, CISSP, CISA, CISM


Examining Underground Economy Servers

This column will take a closer look at how cybercriminals operate underground economy servers.

Written By: Jean-François Legault, CISSP, CISA, CISM


Managing Data-Breach Crises

The best protection against a data breach of personally identifiable information is prevention, but you must still be prepared to investigate and manage a possible crisis.

Written By: Jean-François Legault, CISSP, CISA, CISM


Network Event Logs: Painting a Broader Picture

Examining network event logs in a fraud investigation will yield more evidence contained within the trail of information left by a user’s online activity than any other technical resource.

Written By: Jean-François Legault, CISSP, CISA, CISM


Anything You Say Can and Will Be Used Against You!

During an investigation, we scour the web and social networks for employment backgrounds, contacts, education history and past behavior. However, we should be concerned about information we are posting that the bad guys can use against us.

Written By: Jean-François Legault, CISSP, CISA, CISM


Fraud Analytics: Taking Your Data to the Next Level

This column is the first in a series on data analytics and their use in fraud detection and investigation. Here, we introduce the topic while subsequent columns will focus on specific methods and techniques.

Written By: Jean-François Legault, CISSP, CISA, CISM


Crimeware: Furthering the Criminal Enterprise

Malware -- malicious software -- has been around for years. From the (c)Brain virus in 1986 -- the first to affect the PC -- to the Sasser worm in 2003, scores of viruses and worms have plagued computers.

Written By: Jean-François Legault, CISSP, CISA, CISM


'Web 2.0' Social Network Sites Can Foster Fraud

The shift in the perception of privacy and perceived anonymity on the Internet have transformed useful tools for online communications into risks that need to be managed by organizations.

Written By: Jean-François Legault, CISSP, CISA, CISM


Virtual Economies: Close To The Real World

From real-time social virtual worlds to "massively multiplayer online games" (MMOGs), the Internet and advances in technology have enabled the creation of virtual communities where individuals can interact in cyberspace.

Written By: Jean-François Legault, CISSP, CISA, CISM


Zeus: An Inside Look at a Banking Trojan

Zeus is a crimeware designed primarily to steal users' online banking credentials.

Written By: Jean-François Legault, CISSP, CISA, CISM


Intellectual Property Theft

Intellectual property theft will continue to happen. The faster the organization reacts, the less damage it might have.

Written By: Jean-François Legault, CISSP, CISA, CISM


Mobile Phone Forensics

Simple, second-generation (2G) mobile phones contained evidence like call histories, contact lists and short text messages. Now, 3G and 4G smartphones contain rich evidence such as emails, photos, electronic documents, and browser and instant messaging history.

Written By: Jean-François Legault, CISSP, CISA, CISM


Hidden in Plain Sight

Metadata can provide the forensic examiner with context about an electronic document.

Written By: Jean-François Legault, CISSP, CISA, CISM


Banking Trojans: Stealing from the Source

Outline on how banking Trojans work.

Written By: Jean-François Legault, CISSP, CISA, CISM


Electronic Evidence: Search Strategies For Fraud Examinations

CFEs should follow these search strategies when examining electronic evidence.

Written By: Jean-François Legault, CISSP, CISA, CISM


 

Begin Your Free 30-Day Trial

Unlock full access to Fraud Magazine and explore in-depth articles on the latest trends in fraud prevention and detection.