admin
Combatting the cyber threat to the UK legal sector
Cyber crime remains one of the foremost risks to the legal sector. Targeted attacks against firms are on the rise, […]
Back Issue 39
Issue 39 presents conference research on international standards selection, behavioural driver attribution in connected vehicles, and automated investigative reasoning using AI. Further papers examine deep-learning applications in digital forensics, operational use of human super recognisers, and evidential acquisition from cloud-collaboration platforms. Additional features address transnational cybercrime, social-media admissibility challenges, and practical considerations in establishing digital-forensics laboratories.
Back Issue 37
Issue 37 investigates IoT data-leakage risks, forensic roles within secure payment systems, and methodological frameworks for cyber-grooming investigations. Additional features examine Windows Registry analysis, OSINT practices, and the evidential potential of voice biometry. Articles addressing collaboration technologies and investigator shortages highlight operational pressures, while legal and laboratory insights explore EU cybersecurity governance and graph-theory approaches to modelling forensic processes.
Back Issue 36
Issue 36 examines AI-driven acceleration of child-exploitation investigations, comparative capability in digital-forensic tools, and linguistic methods for analysing online offender behaviour. Additional features explore media-forensics challenges, GPU-enabled password cracking, and professionalisation within the cybersecurity workforce. Articles on memory-forensics techniques, investigative labour pressures, legal disputes, and GPS-based evidential reconstruction highlight operational, methodological and governance considerations shaping contemporary forensic practice.
Back Issue 35
Issue 35 examines declining trust within ransomware ecosystems, evidential challenges arising from flash-memory behaviour, and the expanding impact of IoT devices on digital-forensics workflows. Additional features analyse IoT security standardisation for complex cyber-physical systems, propose Daubert-aligned frameworks for evidential reliability, share practitioner experiences mitigating advanced persistent threats, review Cambridge Analytica–Facebook legal controversies, and explore data hiding in slack space today.



