dfm covers

In This Issue

Written by DFMag

Issue 17 - Out now!

Here's a quick review of some of the main articles within Issue 17

Issue 17 of Digital Forensics Magazine brings new techniques and ideas to the industry. Subscribe today to ensure you get digital access, or if you want, subscribe to the print edition. Find out more at our subscriptions pages.

Here's just a few of the fantastic articles inside Issue 17...

An Overview of Honeypots & SCADA Systems

In this article Andrew Nicholson introduces honeypots for SCADA systems and presents a short study of the current landscape of SCADA honeypots. SCADA honeypots offer an insight into the tools, techniques and procedures used by adversaries that target these systems and can help towards attribution. They also act as early warning systems, provide threat intelligence and divert attacks away from production systems.

Trustworthy Cyber Physical Systems

In this article Hugh Boyse takes a look at how given the increasing prevalence of cyber-physical systems in both the critical national infrastructure and in an emergent Internet of Things, our safety and security depends on their trustworthy operation. The combination of interconnectivity and the dynamic nature of many cyber-physical systems, presents new challenges if we are to reduce the risk of cascading or escalating failures.

Forensic Response to Cyber Terror Takedown

The realization that 99.9% of crimes now tend to have an association with some form of computing, be that, a laptop, cell phone, or other forms of communications. ‘Cyber Forensics’, and ‘First Responder Cyber Response’ are inextricably linked and John Walker considers an attack and how to respond and investigate.

Using Network Intrusion Detection Systems to Acquire Evidence

An important digital forensics process related to security hacking incidents is to collect information from log meta data that are stored in network firewalls, network intrusion detection systems (NIDS), databases, web servers and operation systems. However, the main problem with these logs is that they are designed for debugging systems and that they are often lacking capability for forensics purposes. Muteb Alqahtani & Brian Cusack investigate.

iPhone Backup Files

Part two of this article provides the readers with a realistic experience as they are taken through a hypothetical storyline that was formulated, whilst being provided with recommendations as to where specific valuable artefacts can be located and other tips to aid the forensic investigation process. It demonstrates the techniques utilized, hypotheses made and new advancements that were uncovered.

Erasure Tool Performance Can Beat the Best Intentions

Andrew Woodward and Brian Cusack take a look at how privacy protection is at risk with poor tool performance when it comes to using Secure Erasure Tools. Investigating a number of tools, analysis and comparison provides some concerning results.

My Name Is Paul

Over a number of months during the last year Jeff Harris has been conducting live research using Shodan and other tools. The results he found and the reactions he received when warning some of the organizations of his results make for interesting and in certain aspects concerning reading. Rather than break this article into two parts we think you will agree that it is better to read the whole article in one sitting.

From the Lab – The “Shattered Project”: A Forensic Understanding of Google Glass

Google Glass was first announced in April 2012 and has since been released to 8000 people to test before being released to the public. This is the first in a series of articles planned by Professor Jonathan Rajewski of Champlain College who is investigating Google Glass under the Shattered Project.

Plus all the regular features, news, Robservations, our legal section and Apple Autopsy...

Login to read online or Subscribe today!

Please make cache directory writable.

Submit an Article

Call for Articles

We are keen to publish new articles from all aspects of digital forensics. Click to contact us with your completed article or article ideas.

Featured Book

Learning iOS Forensics

A practical hands-on guide to acquire and analyse iOS devices with the latest forensic techniques and tools.

Meet the Authors

Angus Marshall

Angus Marshall is an independent digital forensic practitioner, author and researcher


Coming up in the Next issue of Digital Forensics Magazine

Graph Database Technology

Attackers examine how your assets are connected, looking for a vulnerable part of the network, and navigating via methods such as “spear phishing.” What they’re really doing is abstracting out the graph of your networked systems, which is the set of security dependencies. Read More »

Fraudulent Use of Digital Images and Detection Survey

This article looks at the basic concepts related to image forgery; the types, detection procedure algorithms and all possible techniques to detect malicious signatures ibased on forgery types and detection techniques. Read More »

Subscribe today

Discovery in the Cloud: An Investigator’s Close Look at Unexpected Risks and Challenges

Documents residing in cloud storage accounts are increasingly coming into scope in digital forensic investigations such as IP theft, regulatory, corruption, merger clearance and civil matters.  Read More »

Every Issue
Plus the usual Competition, Book Reviews, 360, IRQ, Legal

Click here to read more about the future issues