dfm covers
 
 

News

Nuix announce new cybersecurity appointment

Nuix announce new cybersecurity appointment
Nuix appoints digital forensics and incident response expert Chris Pogue to its expanding team of cybersecurity specialists


Read more...

Crown Court Murder Trial Uses 360 Degree Crime Scene Photographs For First Time

Crown Court Murder Trial Uses 360 Degree Crime Scene Photographs For First Time
Photographs From Panoramic 360 Degree Camera Used In Crown Court Murder Trial For First Time


Read more...

AccessData Named Leader of Gartner E-Discovery Magic Quadrant

AccessData Named Leader of Gartner E-Discovery Magic Quadrant
Gartner Positions AccessData in the “Leaders” Quadrant of the E-Discovery Magic Quadrant for the Third Consecutive Year


Read more...

Lockheed Martin Adds CyberPoint to Cyber Security Alliance

Lockheed Martin Adds CyberPoint to Cyber Security Alliance
Lockheed Martin welcomes CyberPoint International, adding their deep technical expertise, innovative solutions, and easy-to-use products to address the advanced persistent threats faced by every global government and commercial organization.


Read more...

CREST supports Government Cyber Essentials Scheme

CREST supports Government Cyber Essentials Scheme
New Award Scheme To Boost Cyber Security For UK Business


Read more...

Cellebrite introduces new UFED mobile forensics software to manage how investigators extract mobile data

Cellebrite introduces new UFED mobile forensics software to manage how investigators extract mobile data
UFED Version 3.0 will accelerate investigations while ensuring users can manage the extraction of vast amounts of mobile data.


Read more...

Nuix 5.2 delivers power and functionality to solve growing range of unstructured data challenges

Nuix 5.2 delivers power and functionality to solve growing range of unstructured data challenges
Nuix today released version 5.2 of the Nuix Engine and its core eDiscovery and Investigator products.


Read more...

Nuix and ITU-IMPACT Partner in Building Capacity to Address Global Cyber Threats

Nuix and ITU-IMPACT Partner in Building Capacity to Address Global Cyber Threats
Nuix is now an Industry Partner of the International Multilateral Partnership Against Cyber Threats (IMPACT), the cybersecurity executing arm of the United Nations’ specialized agency, the International Telecommunication Union (ITU).


Read more...

Nuance Forensics Unveiled to Transform Law Enforcement Investigations

Nuance Forensics Unveiled to Transform Law Enforcement Investigations
Built on Proven Voice Biometrics Technology from Nuance, New Forensics Offering Assists with Prosecution and Defense of Criminal Suspects


Read more...

Digital Forensics in new Postgrad Computing Program

Digital Forensics in new Postgrad Computing Program
The Open University unveils brand new industry guided postgraduate Computing programme


Read more...

 
Please make cache directory writable.
 

Submit an Article

Call for Articles

We are keen to publish new articles from all aspects of digital forensics. Click to contact us with your completed article or article ideas.

Featured Book

Learning iOS Forensics

A practical hands-on guide to acquire and analyse iOS devices with the latest forensic techniques and tools.

Meet the Authors

Andrew Hoog

Andrew Hoog is the Chief Investigative Officer at viaForensics'

 

Coming up in the Next issue of Digital Forensics Magazine

Coming up in Issue 34 on sale from February 2018:


Device Forensics in the Internet of Things

As more businesses and consumers adopt IoT devices, privacy violations and cyber-attacks by malicious actors will become commonplace due to the insecure IoT infrastructure. Read More »

Data Destruction In Current Hard Disks & Data Destruction Techniques

Data destruction is a process traditionally applied using physical techniques, aiming at the completely destruction of the hard disk, however, there is an increasing interest in the use of logical techniques for data destruction, that allow reusing the physical device. Read More »

Subscribe today


Faster Searching For Known Illegal Content

Cryptographic (“MD5”) hash searching for known illegal material is one of the most thorough methods of digital forensic investigation. However, the technique is hampered by the ever-increasing size of media being examined, and the size of the hash list being searched. Read More »

Every Issue
Plus the usual Competition, Book Reviews, 360, IRQ, Legal

Click here to read more about the next issue