Friday, November 8 2024
DF13-Home_image

Digital Forensics & The Fraud Triangle

Nick Miter looks at how forensic software applications predict fraud and corruption using heuristics.

Cracking MS-CHAP2

A look at the MS-CHAP2 network authentication protocol designed by Microsoft back in the days of NT4.0

Cloud-Based Honeypots

Introducing a tool for the forensic practitioner’s toolbox.

First Responders CSIRT & Forensics

A look at the requirements for a First Responder CSIRT

Creating A Virtual Forensics Lab

How to build a lower cost and scalable forensics lab

Improving Security Monitoring Analytics

How to improve SOC Analytics and overall security.

Developing a Tool to Speed Disk Scanning

The problems of the full forensic imaging of a physical storage device and some likely solutions.

Certificate Management

Calum MacLeod outlines the key steps to safeguard your business from disaster.

Covert Channels

Stealing information, command and control servers talking to bots and battle damage assessment.

Plus all the regular features......

Read Now

 

Discover more from Digital Forensics Magazine

Subscribe now to keep reading and get access to the full archive.

Continue reading