dfm covers
 
 

Digital Forensics News

Click Here for the latest Digital Forensics & Cyber Crime News

Print PDF
CLICK HERE NOW TO Get all the latest News Directly from our BLOG
All our lastest news is published directly on our blog where you can provide feedback, comments and connect directly with us @DFMag.


Read more...

Two people a day convicted of sexual abuse against children

Print PDF
Two people a day convicted of sexual abuse against children                       
The NSPCC announced that on average two people are being convicted of child abuse image crimes every day. Christian Berg, CEO and founder of NetClean comments on the fundamental misunderstanding of the scale of the problem.

Read more...

Stegoloader Malware hides exploit code in images

Print PDF
Stegoloader Malware hides exploit code in images
Dell SecureWorks Counter Threat Unit™ Threat Intelligence unit has released information about Stegoloader. Appearing to have been active since 2012, this particular malware uses digital steganography – the art of hiding secret information within a digital image or graphic – to conceal its true nature and to avoid detection.

Read more...

Dispruptive Data Security Key to Outwitting Hackers

Print PDF
Dispruptive Data Security Key to Outwitting Hackers
It is now widely accepted that the enterprise will be subjected to and may even succumb to cyber attack and yet we continue to rely upon a defensive security strategy. A far more effective way to combat the threat is to focus on disrupting the attack while keeping data safe. This article contains some practical do’s and don’ts to help the enteprise transition to a data-centric strategy.

Read more...

Concerns about data privacy online force British consumers to take control

Print PDF
Concerns about data privacy online force British consumers to take control

YouGov research reveals 72 percent of British consumers are concerned about their private information online, UK Information Commissioner (ICO) urges businesses to invest in data privacy.                                                                                           

Read more...

Hilton Honors account flaw

Print PDF
Hilton Honors account flaw
Industry comments following Brian Krebs’ blog details a powerful flaw in the Hilton Hotels site that lets anyone hijack a Hilton Honors account just by knowing or guessing its valid 9-digit Hilton Honors account number.

Read more...

The importance of collecting mobile data in civil litigation cases

Print PDF
The importance of collecting mobile data in Civil litigation cases
Civil litigators who do not consider collecting mobile data risk missing crucial information

Read more...

Yahoo announces innovative authentication mechanism

Print PDF
Yahoo announces innovative authentication mechanism
Yahoo announced recently, a new method of authentication for its services that relies solely on an on-demand generated password that is sent to the user's mobile phone number.
This is not two-factor authentication (which Yahoo already had), but rather single-factor authentication where the single factor is the user's mobile phone.


Read more...

 
Please make cache directory writable.
 

Submit an Article

Call for Articles

We are keen to publish new articles from all aspects of digital forensics. Click to contact us with your completed article or article ideas.

Featured Book

Learning iOS Forensics

A practical hands-on guide to acquire and analyse iOS devices with the latest forensic techniques and tools.

Meet the Authors

Andrew Hoog

Andrew Hoog is the Chief Investigative Officer at viaForensics'

 

Coming up in the Next issue of Digital Forensics Magazine

Coming up in Issue 28 on sale from August 2016:


Penetration Testing Tutorials
Andy Swift will be continuing his series on penetration testing, sheding some light on techniques that can be combined with basic tools to take an ordinary attack that few steps further. Read More »

Recent Advances in Forensic Radiology
This article describes all the recent advancements done till now in the field of forensic radiology.. Read More »

Subscribe today


Forensic approach to ATM fraud
This article gives an overview of the techniques used by ATM attackers as well as the types of threats and challenges the forensics examiner faces in investigating skimming devices. Read More »

Every Issue
Plus the usual Competition, Book Reviews, 360, IRQ, Legal

Click here to read more about the next issue