dfm covers
 
 

In This Issue


Issue 18 - Out now!

Here's a quick review of some of the main articles within Issue 18


Issue 18 of Digital Forensics Magazine brings new techniques and ideas to the industry. Subscribe today to ensure you get digital access, or if you want, subscribe to the print edition. Find out more at our subscriptions pages.

Here's just a few of the fantastic articles inside Issue 18...


Using Fuzzy Hashes for Malware Classification

During the incident response process the fast classification of newly detected malware samples by comparing them with known and analysed samples can be of high value. In this article Marc Remmert investigates how grouping different malware samples can show correlations between different attack waves.


Beyond Timelines - Anchors in Relative Time

Digital forensics and incident response (DFIR) practitioners use timelines to efficiently identify and better understand suspicious activity. Over the last few years the importance of timelines has been increasing and Mark Spencer explains why.


Android Security – Malicious Use of Android Permissions

Google created a reasonable security model in developing android by getting the best from the Linux user model and advancing it. Nikolas Milosevic takes a look at permissions and how they are exploited for malware purposes


Waking the Shark 1.5

There is no doubt that we are living in a time of recognised cyber adversity, with an estimated financial impact on the UK economy of around £27 billion. Link this to regular press reports of successful unauthorised incursions, Hacking, Cyber Extortion, and Denial-of-Service [DoS] attacks; this appears to infer that the battle against cyber crime is one we are not wining. John Walker investigates.

Google Glass II - SHATTERED

Jonathan Rajewski and the team continue the forensic investigation into Google Glass and the development of the automated Python script – Shattered.


Solving The Cyber Skills Challenge

A great deal has been written about a skills shortages in the UK in cyber security, and many initiatives have been rolled out aiming to address the fourth objective within the UK National Cyber Security Strategy. Rob Nowill looks at one of the initiatives the UK Cyber Security Challenge.


Forensic Implications of Vehicle GPS Accuracy

Issues surrounding the use of Global positioning Systems (GPS) for car navigation have highlighted problems that may have implications for investigators; GPS apparently compromises position time measures, Brian Cusack and his team investigate the implications.

Forensic Readiness: Is Your Organization Ready?

Forensic readiness enables organizations to demonstrate due diligence with regulations, conduct digital investigations, and produce evidence that can be used for internal and legal purposes. Mohamed Elyas and the team from the University of Melbourn consider the requirements and implications.



Plus all the regular features, news, Robservations, our legal section and Apple Autopsy...


Login to read online or Subscribe today!



 
Please make cache directory writable.
 

Submit an Article

Call for Articles

We are keen to publish new articles from all aspects of digital forensics. Click to contact us with your completed article or article ideas.

Featured Book

Learning iOS Forensics

A practical hands-on guide to acquire and analyse iOS devices with the latest forensic techniques and tools.

Meet the Authors

George Bailey

George Bailey is an IT security professional with over 15 years of experience

 

Coming up in the Next issue of Digital Forensics Magazine

Coming up in Issue 32 on sale from August 2017:


Triage Solution for Sex Offender Managers

This article considers a proof of concept triage solution for sex offender managers for a local police force which if successful could simplify and modify the way that sex offenders are managed. Read More »

Advancements in Windows Hibernation File Forensics

Brian Gerdon looks at how the windows hibernation files can be a valuable source of information for digital forensic investigators. Read More »

Subscribe today


Why Are Cybercriminals Attracted To Commit Crimes

Individuals who engage in cybercrime have a psychological mindset that is attuned to it. This paper discusses the motives behind cybercrime and what makes cybercrime attractive to cybercriminals. Read More »

Every Issue
Plus the usual Competition, Book Reviews, 360, IRQ, Legal

Click here to read more about the next issue