dfm covers
 
 

News

SecurEnvoy warns businesses on dangers of Mozilla Persona single-sign-on service

SecurEnvoy warns businesses on dangers of Mozilla Persona single-sign-on service
Commenting on the launch of the beta of Mozilla's Persona service SecurEnvoy says the service could prove a security risk for businesses.


Read more...

DMU to launch new Cyber Security Centre

DMU to launch new Cyber Security Centre
De Montfort University prepares for the launch of its new Cyber Security Centre (CSC) on the 18th September


Read more...

Business Leaders Urged to Step Up Response to Cyber Threats

Business Leaders Urged to Step Up Response to Cyber Threats
The UK’s most senior business leaders are getting new advice on how to better tackle the growing cyber threats to their companies.


Read more...

Password hints easily extracted from Windows 7, 8

Password hints easily extracted from Windows 7, 8
Password hints are helpful to users, and possibly to hackers, too.


Read more...

US resists control of internet passing to UN agency

US resists control of internet passing to UN agency
The US has confirmed it would resist efforts to put the internet under the control of the United Nations.


Read more...

NPIA eForensics Pilot Offers Quick Justice.

NPIA eForensics Pilot Offers Quick Justice.
Success of NPIA eForensics pilot set to help forces bring more offenders to justice quicker.


Read more...

Trusteer Discovers a New Financial Malware Targeting Banks

Trusteer Discovers a New Financial Malware Targeting Banks
New Financial Malware Tilon Trojan Evades Detection to Target Bank Customers


Read more...

The Evolving Nature of Hacktivism

The Evolving Nature of Hacktivism
An insight into Anonymous attack activity


Read more...

Lessons Learned from Mat Honan’s Epic Hacking

Lessons Learned from Mat Honan’s Epic Hacking
“ Password-based security mechanisms — which can be cracked, reset, and socially engineered — no longer suffice in the era of cloud computing.”


Read more...

Cellebrite Delivers First Physical Extraction Solution for Nokia BB5 Devices

Cellebrite Delivers First Physical Extraction Solution for Nokia BB5 Devices
Latest Update to UFED Series Product Family Enhances Support for World Leading Mobile Handset Platform


Read more...

 
Please make cache directory writable.
 

Submit an Article

Call for Articles

We are keen to publish new articles from all aspects of digital forensics. Click to contact us with your completed article or article ideas.

Featured Book

Learning iOS Forensics

A practical hands-on guide to acquire and analyse iOS devices with the latest forensic techniques and tools.

Meet the Authors

Andrew Hoog

Andrew Hoog is the Chief Investigative Officer at viaForensics'

 

Coming up in the Next issue of Digital Forensics Magazine

Coming up in Issue 34 on sale from February 2018:


Device Forensics in the Internet of Things

As more businesses and consumers adopt IoT devices, privacy violations and cyber-attacks by malicious actors will become commonplace due to the insecure IoT infrastructure. Read More »

Data Destruction In Current Hard Disks & Data Destruction Techniques

Data destruction is a process traditionally applied using physical techniques, aiming at the completely destruction of the hard disk, however, there is an increasing interest in the use of logical techniques for data destruction, that allow reusing the physical device. Read More »

Subscribe today


Faster Searching For Known Illegal Content

Cryptographic (“MD5”) hash searching for known illegal material is one of the most thorough methods of digital forensic investigation. However, the technique is hampered by the ever-increasing size of media being examined, and the size of the hash list being searched. Read More »

Every Issue
Plus the usual Competition, Book Reviews, 360, IRQ, Legal

Click here to read more about the next issue