dfm covers
 
 

In This Issue

Written by DFMAG


Issue 18 - Out now!

Here's a quick review of some of the main articles within Issue 18


Issue 18 of Digital Forensics Magazine brings new techniques and ideas to the industry. Subscribe today to ensure you get digital access, or if you want, subscribe to the print edition. Find out more at our subscriptions pages.

Here's just a few of the fantastic articles inside Issue 18...


Using Fuzzy Hashes for Malware Classification

During the incident response process the fast classification of newly detected malware samples by comparing them with known and analysed samples can be of high value. In this article Marc Remmert investigates how grouping different malware samples can show correlations between different attack waves.


Beyond Timelines - Anchors in Relative Time

Digital forensics and incident response (DFIR) practitioners use timelines to efficiently identify and better understand suspicious activity. Over the last few years the importance of timelines has been increasing and Mark Spencer explains why.


Android Security – Malicious Use of Android Permissions

Google created a reasonable security model in developing android by getting the best from the Linux user model and advancing it. Nikolas Milosevic takes a look at permissions and how they are exploited for malware purposes


Waking the Shark 1.5

There is no doubt that we are living in a time of recognised cyber adversity, with an estimated financial impact on the UK economy of around £27 billion. Link this to regular press reports of successful unauthorised incursions, Hacking, Cyber Extortion, and Denial-of-Service [DoS] attacks; this appears to infer that the battle against cyber crime is one we are not wining. John Walker investigates.

Google Glass II - SHATTERED

Jonathan Rajewski and the team continue the forensic investigation into Google Glass and the development of the automated Python script – Shattered.


Solving The Cyber Skills Challenge

A great deal has been written about a skills shortages in the UK in cyber security, and many initiatives have been rolled out aiming to address the fourth objective within the UK National Cyber Security Strategy. Rob Nowill looks at one of the initiatives the UK Cyber Security Challenge.


Forensic Implications of Vehicle GPS Accuracy

Issues surrounding the use of Global positioning Systems (GPS) for car navigation have highlighted problems that may have implications for investigators; GPS apparently compromises position time measures, Brian Cusack and his team investigate the implications.

Forensic Readiness: Is Your Organization Ready?

Forensic readiness enables organizations to demonstrate due diligence with regulations, conduct digital investigations, and produce evidence that can be used for internal and legal purposes. Mohamed Elyas and the team from the University of Melbourn consider the requirements and implications.



Plus all the regular features, news, Robservations, our legal section and Apple Autopsy...


Login to read online or Subscribe today!



 
Please make cache directory writable.
 

Submit an Article

Call for Articles

We are keen to publish new articles from all aspects of digital forensics. Click to contact us with your completed article or article ideas.

Featured Book

Learning iOS Forensics

A practical hands-on guide to acquire and analyse iOS devices with the latest forensic techniques and tools.

Meet the Authors

Andrew Harbison

Andrew Harbison is a Director and IT Forensics Lead at Grant Thornton

 

Coming up in the Next issue of Digital Forensics Magazine

Coming up in Issue 34 on sale from February 2018:


Device Forensics in the Internet of Things

As more businesses and consumers adopt IoT devices, privacy violations and cyber-attacks by malicious actors will become commonplace due to the insecure IoT infrastructure. Read More »

Data Destruction In Current Hard Disks & Data Destruction Techniques

Data destruction is a process traditionally applied using physical techniques, aiming at the completely destruction of the hard disk, however, there is an increasing interest in the use of logical techniques for data destruction, that allow reusing the physical device. Read More »

Subscribe today


Faster Searching For Known Illegal Content

Cryptographic (“MD5”) hash searching for known illegal material is one of the most thorough methods of digital forensic investigation. However, the technique is hampered by the ever-increasing size of media being examined, and the size of the hash list being searched. Read More »

Every Issue
Plus the usual Competition, Book Reviews, 360, IRQ, Legal

Click here to read more about the next issue