dfm covers
 
 

In This Issue

Written by DFM Team


Issue 28 - Out now!

Here's a quick review of some of the main articles within Issue 28


Issue 28 of Digital Forensics Magazine brings new techniques and ideas to the industry. Subscribe today to ensure you get digital access, or if you want, subscribe to the print edition. Find out more at our subscriptions pages.

Here's just a few of the fantastic articles inside Issue 28...


Chromecast 2.0 Log Extraction and Analysis

The Google Chromecast 2nd generation is a dongle device that connects to televisions with an HDMI input, facilitating streaming of media. Imraj Dhaliwal, Dr. Haider M. al-Khateeb and Dr Gregory Epiphaniou investigate potential evidential artefacts’ from this device.


Security Guidance For Critical Areas Of Embedded Computing

Can we secure the Internet of Things (IoT) before it is too late? Art Swift from the prpl (pronounced ‘Purple’) investigates.


Careers in Cyber Security and Professional Development Planning

Information security is a viable career option. Terry Neal provides a Structured Approach to Planning Your Career in Cyber Security. 


Semantic Trust In What We Own

Shall we or shan’t we tell how to open an iPhone? Brian Cusack discusses the saga of Apple v the US Government and the wider implications.

Image Visualization and Content Identification Using Mathematica

Richard Carbone’s second significant article in the series, looking at how to use this particular software to analyse large data sets of images.


Cloud Honeypots

How Feasible Is A Distributed Honeypot Deployment In The Cloud? Simon Clary & Adrian Winckles investigate.


Talking About Patent Infringement

Our legal editor Scott Zimmerman takes an in depth look at Patent Infringement using the case of Cisco v Arista Networks. 


From the Lab – SSD Forensics

If there is anything that has challenged Locard’s principle of exchange from a digital forensics point of view, it is the Solid State Devices (SSDs). Santosh Khadsare helps our understanding of the Impact of SSDs on Digital Investigations.


Plus all the regular features, news, our legal section and From The Lab...


Login to read online or Subscribe today!



 
Please make cache directory writable.
 

Submit an Article

Call for Articles

We are keen to publish new articles from all aspects of digital forensics. Click to contact us with your completed article or article ideas.

Featured Book

Learning iOS Forensics

A practical hands-on guide to acquire and analyse iOS devices with the latest forensic techniques and tools.

Meet the Authors

Angus Marshall

Angus Marshall is an independent digital forensic practitioner, author and researcher

 

Coming up in the Next issue of Digital Forensics Magazine

Coming up in Issue 34 on sale from February 2018:


Device Forensics in the Internet of Things

As more businesses and consumers adopt IoT devices, privacy violations and cyber-attacks by malicious actors will become commonplace due to the insecure IoT infrastructure. Read More »

Data Destruction In Current Hard Disks & Data Destruction Techniques

Data destruction is a process traditionally applied using physical techniques, aiming at the completely destruction of the hard disk, however, there is an increasing interest in the use of logical techniques for data destruction, that allow reusing the physical device. Read More »

Subscribe today


Faster Searching For Known Illegal Content

Cryptographic (“MD5”) hash searching for known illegal material is one of the most thorough methods of digital forensic investigation. However, the technique is hampered by the ever-increasing size of media being examined, and the size of the hash list being searched. Read More »

Every Issue
Plus the usual Competition, Book Reviews, 360, IRQ, Legal

Click here to read more about the next issue