dfm covers
 
 

News

Buying into Cyber Insurance

Buying into Cyber Insurance
Do You Need It?


Read more...

Biggest ever cyber security exercise in Europe today

Biggest ever cyber security exercise in Europe today
More than 200 organisations and 400 cyber-security professionals from 29 European countries are testing their readiness to counter cyber-attacks in a day-long simulation, organised by the European Union Agency for Network and Information Security (ENISA).


Read more...

Oxygen Forensic Passware Analyst Acquires iCloud Data Even with iOS 8 Encryption

Oxygen Forensic Passware Analyst Acquires iCloud Data Even with iOS 8 Encryption
Oxygen Forensics, Inc. announces Oxygen Forensic® Passware® Analyst can extract iCloud backup data of any Apple device even with iOS 8 encryption upgrades


Read more...

Millions of websites hit by Drupal hack attack

Millions of websites hit by Drupal hack attack
Up to 12 million websites may have been compromised by attackers who took advantage of a bug in the widely used Drupal software.


Read more...

Pirate Bay Co-founder Jailed in Denmark

Pirate Bay Co-founder Jailed in Denmark
The Swedish co-founder of file-sharing website The Pirate Bay was sentenced to three years and six months in jail Friday in the largest hacking case in Denmark's history.


Read more...

FireEye and Quantum team to streamline adoption of cybersecurity forensics solutions

FireEye and Quantum team to streamline adoption of cybersecurity forensics solutions
New partnership enables enterprises to easily conduct cybersecurity investigations and improve security against advanced attacks


Read more...

Cyber-crime costs North West region’s businesses almost £107 million a year – a new report reveals

Cyber-crime costs North West region’s businesses almost £107 million a year – a new report reveals
A report into the cyber security market in the North West has revealed that online criminal activity is costing key sectors in the regional economy almost £107 million a year – threatening growth, businesses and jobs.


Read more...

Heads in the Sand: Small Businesses Convinced a Cyber-attack Will Never Happen to Them

Heads in the Sand: Small Businesses Convinced a Cyber-attack Will Never Happen to Them
One in three micro-firms helpless in the face of cybercrime.


Read more...

ISACA addresses new era in cybersecurity awareness, education and leadership at EuroCACS/ISRM Conference

ISACA addresses new era in cybersecurity awareness, education and leadership at EuroCACS/ISRM Conference
Barcelona conference themed "Today's Connections, Tomorrow's Solutions" brings global experts together to examine cybersecurity, risk and assurance.


Read more...

Setting the Agenda for Cyber Security, Cyber Crime and Cyber Terrorism Research

Setting the Agenda for Cyber Security, Cyber Crime and Cyber Terrorism Research
Espion kicks-off work on €1 million Pan-European R&D Project


Read more...

 
Please make cache directory writable.
 

Submit an Article

Call for Articles

We are keen to publish new articles from all aspects of digital forensics. Click to contact us with your completed article or article ideas.

Featured Book

Learning iOS Forensics

A practical hands-on guide to acquire and analyse iOS devices with the latest forensic techniques and tools.

Meet the Authors

George Bailey

George Bailey is an IT security professional with over 15 years of experience

 

Coming up in the Next issue of Digital Forensics Magazine

Coming up in Issue 34 on sale from February 2018:


Device Forensics in the Internet of Things

As more businesses and consumers adopt IoT devices, privacy violations and cyber-attacks by malicious actors will become commonplace due to the insecure IoT infrastructure. Read More »

Data Destruction In Current Hard Disks & Data Destruction Techniques

Data destruction is a process traditionally applied using physical techniques, aiming at the completely destruction of the hard disk, however, there is an increasing interest in the use of logical techniques for data destruction, that allow reusing the physical device. Read More »

Subscribe today


Faster Searching For Known Illegal Content

Cryptographic (“MD5”) hash searching for known illegal material is one of the most thorough methods of digital forensic investigation. However, the technique is hampered by the ever-increasing size of media being examined, and the size of the hash list being searched. Read More »

Every Issue
Plus the usual Competition, Book Reviews, 360, IRQ, Legal

Click here to read more about the next issue