
Five Tips For Using Google Earth In Forensics
Michael Harrington’s five useful tips for investigators to put into practice when analysing geo-location data
Google Desktop Forensics
The second part of a two-part article by Jenn Byrne that looks in detail at examining Google Desktop
Social Networking Steganography
Brian Cusack and Aimie Chee investigate whether or not steganography should be a routine forensics check
Utilising Reputation Data
William Anderson takes a look at why AV products need to be augmented by other tools and techniques
iPhone Backup Files
The first in a two part series of articles by Kate Wright
The History of Malware
Nikola Milosevic takes an in depth look at the history and evolution of malware to the present day
DFCA Workshop Report
Identifying key stakeholders, resources, challenges and potential projects in order to help direct future R&D
A Fresh Look at Cryptography
Julian Ashbourn takes a look at cryptography in general and introduces the simple SilkPad application
Plus all the regular features......