dfm covers
 
 

News

Thirteen plead guilty to Anonymous hack on Paypal

Thirteen plead guilty to Anonymous hack on Paypal
Members of Anonymous attack on Paypal plead guilty to taking part in the 2010 protest


Read more...

12 suspected cybercriminals arrested in Russia along with the creator of Blackhole

12 suspected cybercriminals arrested in Russia along with the creator of Blackhole
The suspects are charged with creating and participating in a criminal organization


Read more...

Huddersfield Support Officer scores high in US Defence cyber challenge

Huddersfield Support Officer scores high in US Defence cyber challenge
Technical support officer beaten only by a team of four from Northrop Grumman


Read more...

Barclays hit by Cyber Criminals

Barclays hit by Cyber Criminals
Eight men have been arrested after a gang stole more than £1m from a high street bank by taking control of one of its computer systems.


Read more...

Social media enables cyber criminals to build profiles for identity theft

Social media enables cyber criminals to build profiles for identity theft
Sites like Twitter, Facebook and Instagram are making people more vulnerable to cyber crime.


Read more...

Cellebrite Files Intellectual Property Infringement and Trade Secret Misappropriation Lawsuit

Cellebrite Files Intellectual Property Infringement and Trade Secret Misappropriation Lawsuit


Read more...

Hacker Halted 2013: Whistleblowers required!

Hacker Halted 2013: Whistleblowers required!
The Call for Infosec Professionals to Become Whistleblowers


Read more...

Cyber-poachers hack GPS collar data to pinpoint tigers

Cyber-poachers hack GPS collar data to pinpoint tigers


Read more...

DHS cybersecurity appointment seen as government-industry bridge

DHS cybersecurity appointment seen as government-industry bridge
Appointing McAfee's Phyllis Schneck welcomed given new tension between government, private sector following NSA revelations.


Read more...

New company gives people the chance to learn CSI skills

New company gives people the chance to learn CSI skills
Schools, universities, businesses and even stag parties are being given the chance to take part in real-life CSI experiences thanks to a new business set up by two Teesside University graduates.


Read more...

 
Please make cache directory writable.
 

Submit an Article

Call for Articles

We are keen to publish new articles from all aspects of digital forensics. Click to contact us with your completed article or article ideas.

Featured Book

Learning iOS Forensics

A practical hands-on guide to acquire and analyse iOS devices with the latest forensic techniques and tools.

Meet the Authors

George Bailey

George Bailey is an IT security professional with over 15 years of experience

 

Coming up in the Next issue of Digital Forensics Magazine

Coming up in Issue 34 on sale from February 2018:


Device Forensics in the Internet of Things

As more businesses and consumers adopt IoT devices, privacy violations and cyber-attacks by malicious actors will become commonplace due to the insecure IoT infrastructure. Read More »

Data Destruction In Current Hard Disks & Data Destruction Techniques

Data destruction is a process traditionally applied using physical techniques, aiming at the completely destruction of the hard disk, however, there is an increasing interest in the use of logical techniques for data destruction, that allow reusing the physical device. Read More »

Subscribe today


Faster Searching For Known Illegal Content

Cryptographic (“MD5”) hash searching for known illegal material is one of the most thorough methods of digital forensic investigation. However, the technique is hampered by the ever-increasing size of media being examined, and the size of the hash list being searched. Read More »

Every Issue
Plus the usual Competition, Book Reviews, 360, IRQ, Legal

Click here to read more about the next issue