The global capital markets are highly vulnerable to cyber attack…and Greece could be the warm-up

By: John Edge Because my roles have always involved new technologies applied to existing markets, I’ve been trained to think about technology related governance and risk; now as I look to a future of affordable mass compute power and artificial Continue reading The global capital markets are highly vulnerable to cyber attack…and Greece could be the warm-up

Share

Offender profiling is taking a different shape, as investigators grapple with increasingly ‘social’ criminal activity

Mobile forensics has changed the methodology when it comes to offender profiling. The frequent use of mobile devices has provided investigators with another source for profiling criminal suspects, as well as an insight into their habits and personalities. This is Continue reading Offender profiling is taking a different shape, as investigators grapple with increasingly ‘social’ criminal activity

Share

Authors – Book Reviewers – Product Reviewers – Bloggers – Evangelists

Digital Forensics Magazine is always on the look out for new talent and content and as the number one magazine for all matters Digital Forensics we are looking to expand our list of contributors. If you feel that you have Continue reading Authors – Book Reviewers – Product Reviewers – Bloggers – Evangelists

Share

Protect Your Business From State-Sponsored Attacks

It has taken some time but we finally have succumbed to the delights of a certain kitchen utensil. Years of resisting George, John, and the seductive talents of Penelope, had left me more determined than ever to resist at all Continue reading Protect Your Business From State-Sponsored Attacks

Share

Digital Forensics Capability Analysis

The ICT KTN, on behalf of the Forensic Science Special Interest Group (FSSIG), is conducting a survey of the UK’s Digital Forensics Capability. This work is being managed by Angus Marshall, of n-gate ltd., to whom any initial queries should Continue reading Digital Forensics Capability Analysis

Share

Big Brother Forensics: Device Tracking Using Browser-Based Artifacts (Part 1)

[Author’s Note: Geo-location artifacts have been a frequent focus of my research, and I am amazed at how quickly they are permeating operating systems, applications and file formats.In the fall of 2011 I had the pleasure of writing an article Continue reading Big Brother Forensics: Device Tracking Using Browser-Based Artifacts (Part 1)

Share