dfm covers
 
 

Digital Forensics News

Two people a day convicted of sexual abuse against children

Print PDF
Two people a day convicted of sexual abuse against children                       
The NSPCC announced that on average two people are being convicted of child abuse image crimes every day. Christian Berg, CEO and founder of NetClean comments on the fundamental misunderstanding of the scale of the problem.

Read more...

Stegoloader Malware hides exploit code in images

Print PDF
Stegoloader Malware hides exploit code in images
Dell SecureWorks Counter Threat Unit™ Threat Intelligence unit has released information about Stegoloader. Appearing to have been active since 2012, this particular malware uses digital steganography – the art of hiding secret information within a digital image or graphic – to conceal its true nature and to avoid detection.

Read more...

Concerns about data privacy online force British consumers to take control

Print PDF
Concerns about data privacy online force British consumers to take control

YouGov research reveals 72 percent of British consumers are concerned about their private information online, UK Information Commissioner (ICO) urges businesses to invest in data privacy.                                                                                           

Read more...

Hilton Honors account flaw

Print PDF
Hilton Honors account flaw
Industry comments following Brian Krebs’ blog details a powerful flaw in the Hilton Hotels site that lets anyone hijack a Hilton Honors account just by knowing or guessing its valid 9-digit Hilton Honors account number.

Read more...

The importance of collecting mobile data in civil litigation cases

Print PDF
The importance of collecting mobile data in Civil litigation cases
Civil litigators who do not consider collecting mobile data risk missing crucial information

Read more...

Yahoo announces innovative authentication mechanism

Print PDF
Yahoo announces innovative authentication mechanism
Yahoo announced recently, a new method of authentication for its services that relies solely on an on-demand generated password that is sent to the user's mobile phone number.
This is not two-factor authentication (which Yahoo already had), but rather single-factor authentication where the single factor is the user's mobile phone.


Read more...

PCI compliance on the rise

Print PDF
PCI Compliance up 20% from 2014
The number of organisations that fully complied with the payment card industry (PCI) security standards during 2014 rose to 20%


Read more...

Understanding the FREAK flaw

Print PDF
Expert provides understanding of the FREAK flaw
AlienVault Senior Product Manager Andy Manoske provides an insight into this latest threat.


Read more...

 
Please make cache directory writable.
 

Submit an Article

Call for Articles

We are keen to publish new articles from all aspects of digital forensics. Click to contact us with your completed article or article ideas.

Featured Book

Hacking the Human

Full of ideas and angles that turn day-to-day security management on its head. Hacking the Human by Ian Mann.

Meet the Authors

Andrew Harbison

Andrew Harbison is a Director and IT Forensics Lead at Grant Thornton

 

Coming up in the Next issue of Digital Forensics Magazine

Coming up in Issue 24 on sale from August 2015:


BitCoin Targeted Phishing
This feature article is all about BitCoin and a Phishing attack. The article will explain what Bitcoin is and how this phishing attack was targeted at BitCoin. Read More »

Dealing with the ‘Unknown Unknowns’ of Intelligence Data
The article will address how intelligence agencies can use data more effectively to predict and model crime. Read More »

Subscribe today


Finding the relevant artefact in visual content
Jan Willem Klerkx explains how the University of Amsterdam solved the problem of finding relevant artefacts in pictures in an effective way. Read More »

Every Issue
Plus the usual Competition, Book Reviews, 360, IRQ, Legal

Click here to read more about the next issue