Thursday, April 23 2026

Back Issue 24

admin

Issue 24 examines the exploitation of stolen personal data for human-mapping, the application of Bloom filters to evidentiary discovery, and security implications arising from Layer-2 vulnerabilities. Additional features analyse social-media forensics, insider-threat dynamics, and digital profiling techniques. Articles on CSOC design, cyber-victim journey mapping, consumer-privacy legislation, and honeynet deployment highlight evolving investigative, operational and governance considerations.

Read More

Back Issue 23

admin

Issue 23 analyses eDiscovery’s expanding role in digital investigations, criminological journey-mapping methods, and organisational preparedness for emerging forensic standards. Additional features examine modern honeypot applications, SOC operational resilience, and techniques used in sensitive-information exfiltration. Articles on autonomous-vehicle forensics, network-segmentation strategy, and antivirus efficacy accompany legal commentary on CFAA reform and laboratory insights into DNA-based bioinformatics for evidential analysis.

Read More

Back Issue 22

admin

Issue 22 examines advanced SQLite-evidence extraction, smartphone-investigation models for cloud-centric environments, and emerging forensic methodologies for IoT incidents. Additional features explore big-data analytics for intelligence, characteristics of the deep web, SME cybersecurity challenges, and evolving IoT botnet threats. Articles on public-sector data-handling, PCI DSS compliance, African cyber-law reforms, and network-security big-data monitoring highlight diverse operational and governance considerations.

Read More

Back Issue 21

admin

Issue 21 examines foundational and emerging challenges across digital forensics, including SQLite-based artefact reconstruction, large-scale image-recovery analytics, memory-resident cryptographic key extraction, and security concerns within cyber-physical systems. Additional research addresses IPv6 tunnelling vulnerabilities, security-analytics evolution, email-security modernisation, APT-resilience strategies, and narrative framing for cyber-physical adoption, with legal and laboratory features expanding practice-ready investigative and evidential methodologies.

Read More

Back Issue 20

admin

Issue 20 examines volatile-memory credential recovery, steganography detection in audio streams, and cross-device data exchange through hydrological-cycle analogies. Features explore convergence between IT security and physical access control, governance of privileged permissions, and psychological influences on user behaviour. Articles further address critical-infrastructure security attributes, ZFS-based super-timelines, and the emergence of the Cyber Scheme, alongside legal and laboratory insights into mobile-device investigations.

Read More
1 17 18 19 20 21 23