admin
Back Issue 13
Issue 13 examines weaknesses in MS-CHAPv2 VPN authentication, fraud-detection heuristics, and operational insights from cloud-based honeypots. It evaluates CSIRT first-responder standards, virtualised lab architectures, and advances in SOC monitoring analytics. Features include disk-scanning optimisation, certificate-authority risk, and covert-channel techniques, alongside legal analysis of intellectual-property frameworks and laboratory review of emerging eDiscovery platforms.
Back Issue 12
Issue 12 addresses first-responder responsibilities, reverse-engineering of Perl2Exe binaries, and forensic risks associated with mobile-device use in public spaces. It examines ethical-hacking practice, Mac forensics tooling, and social-network evidence extraction. Additional features explore covert-channel techniques, scalable video identification, and SMS-2FA bypass methods, alongside legal analysis of the Megaupload case and laboratory insights into UFED Touch workflows.
Back Issue 11
Issue 11 explores operational challenges central to contemporary digital investigations, including entry-point failures that stall casework, stochastic methods for attributing data theft, and weaknesses in WPS security. It examines mobile-forensics growth in China, Mac imaging practices, botnet dynamics, covert-channel detection, evidential standards in China, and advanced image-analysis workflows—providing practitioners with applied insights for more resilient, defensible forensic operations.
Back Issue 10
Issue 10 examines evolving challenges in mobile and smartphone forensics, including Android credential cracking, iOS 5 artefacts, and advanced Windows Mobile analysis. It explores evidential uncertainty, traceback methodologies, and the escalating scale of digital evidence. Practitioner perspectives include professional interviews, organisational profiles, and applied chip-off techniques, offering practical insight into contemporary investigative and operational constraints.
Back Issue 9
Issue 9 explores practical tools and investigative techniques spanning malware detection with Wireshark, browser-based device tracking, and large-scale social-media monitoring. It examines cryptanalysis on distributed systems, deep-packet inspection in high-speed networks, Mac geotagging artefacts, and digital-archiving challenges. The issue also addresses evidential uncertainty, evolving privacy law, and advanced forensic tooling, offering practitioners operational depth across contemporary investigative domains.




