admin
10 Types of British Hackers and How They Can Harm You
An intriguing piece drafted by the ZenShield team that will take you on a journey across the UK, revealing the modus operandi […]
9 Shocking Signs You’re Secretly Being Recorded on Video Calls
Imagine someone secretly recording you during video calls – how would you react? The Geonode team has been researching this growing concern, […]
From Record Fines to AI Governance: Data Protection Highlights of 2023
Along with a number of key developments, 2023 saw the fifth anniversary of The General Data Protection Regulation (GDPR), cited […]
Back Issue 53
Issue 53 examines applied and conceptual dimensions of artificial intelligence within security and justice contexts, including multimodal algorithmic strategies for access control and AI’s emerging role across criminal-justice processes. Further features explore AI’s origins, analyse the global ramifications of the WannaCry attack, and review the Cyber Scheme’s evolution in addressing skills development and professional capability within the UK cybersecurity ecosystem.
Back Issue 52
Challenges Detecting Email Scams – Natural Language Processing
The use of email has evolved radically since the 1960s when the first email was sent. It was simple text and sent between a limited number of mainframe computers in the network. Today emails are multimedia, have their own servers or cloud service, and are at the core of global communications.
Rethinking Remote DFIR – Why Investigators Need to Remotely Access Devices Online in The New Normal
Effective data management practices are no longer a, nice to have. Today, they are fundamental to the success of almost every business department. In a recent DFIR report, half of the 56 organisations surveyed revealed that their workforce was more than 50% remote, while close to a third had a workforce who were 75% remote.
Forensic Analysis of the NetWire Stack – A project related to NetWire stack analysis
NetWire was used in one of the highest-stakes cases to conduct long-term surveillance and surreptitiously deliver incriminating documents which were later used in criminal prosecution. Casework at Arsenal has involved the analysis of computers compromised by versions of the NetWire remote access trojan (RAT).
Empowering Digital Forensics in Policing – Why Law Enforcement Agencies Must Transition to Intelligent Cloud Review Platforms
Jon Cook from Exterro investigates why Law Enforcement Agencies Must Transition to Intelligent Cloud Review Platforms and how digital forensics professionals can leverage key technologies to make the most out of data in criminal investigations.

