Jean-François Legault, CISSP, CISA, CISM
Preying on Fear, Uncertainty, and Doubt: Cyber Fraud in an Economic Downturn
A look at what cyber fraud issues may arise in an economic downturn by employees who have been layed off or those that remain with fewer internal controls
Written By: Jean-François Legault, CISSP, CISA, CISM
SQL Injection Attacks
Used to read and modify sensitive data stored in a website's databse, SQL injection attacks operate by inserting malicious code that sites' database servers process.
Written By: Jean-François Legault, CISSP, CISA, CISM
Examining Underground Economy Servers
This column will take a closer look at how cybercriminals operate underground economy servers.
Written By: Jean-François Legault, CISSP, CISA, CISM
Managing Data-Breach Crises
The best protection against a data breach of personally identifiable information is prevention, but you must still be prepared to investigate and manage a possible crisis.
Written By: Jean-François Legault, CISSP, CISA, CISM
Network Event Logs: Painting a Broader Picture
Examining network event logs in a fraud investigation will yield more evidence contained within the trail of information left by a user’s online activity than any other technical resource.
Written By: Jean-François Legault, CISSP, CISA, CISM
Anything You Say Can and Will Be Used Against You!
During an investigation, we scour the web and social networks for employment backgrounds, contacts, education history and past behavior. However, we should be concerned about information we are posting that the bad guys can use against us.
Written By: Jean-François Legault, CISSP, CISA, CISM
Fraud Analytics: Taking Your Data to the Next Level
This column is the first in a series on data analytics and their use in fraud detection and investigation. Here, we introduce the topic while subsequent columns will focus on specific methods and techniques.
Written By: Jean-François Legault, CISSP, CISA, CISM
Crimeware: Furthering the Criminal Enterprise
Malware -- malicious software -- has been around for years. From the (c)Brain virus in 1986 -- the first to affect the PC -- to the Sasser worm in 2003, scores of viruses and worms have plagued computers.
Written By: Jean-François Legault, CISSP, CISA, CISM
'Web 2.0' Social Network Sites Can Foster Fraud
The shift in the perception of privacy and perceived anonymity on the Internet have transformed useful tools for online communications into risks that need to be managed by organizations.
Written By: Jean-François Legault, CISSP, CISA, CISM
Virtual Economies: Close To The Real World
From real-time social virtual worlds to "massively multiplayer online games" (MMOGs), the Internet and advances in technology have enabled the creation of virtual communities where individuals can interact in cyberspace.
Written By: Jean-François Legault, CISSP, CISA, CISM
Zeus: An Inside Look at a Banking Trojan
Zeus is a crimeware designed primarily to steal users' online banking credentials.
Written By: Jean-François Legault, CISSP, CISA, CISM
Intellectual Property Theft
Intellectual property theft will continue to happen. The faster the organization reacts, the less damage it might have.
Written By: Jean-François Legault, CISSP, CISA, CISM
Mobile Phone Forensics
Simple, second-generation (2G) mobile phones contained evidence like call histories, contact lists and short text messages. Now, 3G and 4G smartphones contain rich evidence such as emails, photos, electronic documents, and browser and instant messaging history.
Written By: Jean-François Legault, CISSP, CISA, CISM
Hidden in Plain Sight
Metadata can provide the forensic examiner with context about an electronic document.
Written By: Jean-François Legault, CISSP, CISA, CISM
Banking Trojans: Stealing from the Source
Outline on how banking Trojans work.
Written By: Jean-François Legault, CISSP, CISA, CISM
Electronic Evidence: Search Strategies For Fraud Examinations
CFEs should follow these search strategies when examining electronic evidence.
Written By: Jean-François Legault, CISSP, CISA, CISM
Begin Your Free 30-Day Trial
Unlock full access to Fraud Magazine and explore in-depth articles on the latest trends in fraud prevention and detection.
