dfm covers
 
 

In This Issue

Written by DFMAG


Issue 18 - Out now!

Here's a quick review of some of the main articles within Issue 18


Issue 18 of Digital Forensics Magazine brings new techniques and ideas to the industry. Subscribe today to ensure you get digital access, or if you want, subscribe to the print edition. Find out more at our subscriptions pages.

Here's just a few of the fantastic articles inside Issue 18...


Using Fuzzy Hashes for Malware Classification

During the incident response process the fast classification of newly detected malware samples by comparing them with known and analysed samples can be of high value. In this article Marc Remmert investigates how grouping different malware samples can show correlations between different attack waves.


Beyond Timelines - Anchors in Relative Time

Digital forensics and incident response (DFIR) practitioners use timelines to efficiently identify and better understand suspicious activity. Over the last few years the importance of timelines has been increasing and Mark Spencer explains why.


Android Security – Malicious Use of Android Permissions

Google created a reasonable security model in developing android by getting the best from the Linux user model and advancing it. Nikolas Milosevic takes a look at permissions and how they are exploited for malware purposes


Waking the Shark 1.5

There is no doubt that we are living in a time of recognised cyber adversity, with an estimated financial impact on the UK economy of around £27 billion. Link this to regular press reports of successful unauthorised incursions, Hacking, Cyber Extortion, and Denial-of-Service [DoS] attacks; this appears to infer that the battle against cyber crime is one we are not wining. John Walker investigates.

Google Glass II - SHATTERED

Jonathan Rajewski and the team continue the forensic investigation into Google Glass and the development of the automated Python script – Shattered.


Solving The Cyber Skills Challenge

A great deal has been written about a skills shortages in the UK in cyber security, and many initiatives have been rolled out aiming to address the fourth objective within the UK National Cyber Security Strategy. Rob Nowill looks at one of the initiatives the UK Cyber Security Challenge.


Forensic Implications of Vehicle GPS Accuracy

Issues surrounding the use of Global positioning Systems (GPS) for car navigation have highlighted problems that may have implications for investigators; GPS apparently compromises position time measures, Brian Cusack and his team investigate the implications.

Forensic Readiness: Is Your Organization Ready?

Forensic readiness enables organizations to demonstrate due diligence with regulations, conduct digital investigations, and produce evidence that can be used for internal and legal purposes. Mohamed Elyas and the team from the University of Melbourn consider the requirements and implications.



Plus all the regular features, news, Robservations, our legal section and Apple Autopsy...


Login to read online or Subscribe today!



 
Please make cache directory writable.
 

Submit an Article

Call for Articles

We are keen to publish new articles from all aspects of digital forensics. Click to contact us with your completed article or article ideas.

Featured Book

Learning iOS Forensics

A practical hands-on guide to acquire and analyse iOS devices with the latest forensic techniques and tools.

Meet the Authors

Scott C. Zimmerman

Scott C. Zimmerman is a CISSP qualified Information Security consultant and presenter

 

Coming up in the Next issue of Digital Forensics Magazine

Coming up in Issue 38 on sale from February 2019:


Crowd Sourcing Digital Evidence The Risk v The Reward

All digital devices used today can be considered as a potential source for digital evidence. Andrew Ryan investigates the current state in the art of crowd sourced digital evidence. Read More »

Recovery of Forensic Artifacts from Deleted Jump-List in Windows 10

Jump-Lists are widely discussed in forensics community since the release of Windows 7 and are having more capabilities to reveal forensics artifacts in Windows 10. Read More »

Subscribe today


Operacion Bitcoin

The article is an actual case study of an Interpol investigation carried out in association with CertUY that has been ongoing for some months. It is written by the first hacker sent to prison in Uruguay who is currently out on bail pending sentencing. Read More »

Every Issue
Plus the usual Competition, Book Reviews, 360, IRQ, Legal

Click here to read more about the next issue