
Beyond Timelines - Anchors in Relative Time
The importance of timelines to digital forensics and incident response (DFIR) practitioners has been increasing, and Mark Spencer explains why.
Using Fuzzy Hashes for Malware Classification
In this article, Marc Remmert investigates how grouping different malware samples can show correlations between different attack waves.
Beyond Timelines – Anchors in Relative Time
The importance of timelines to digital forensics and incident response (DFIR) practitioners has been increasing, and Mark Spencer explains why.
Android Security
Google created a reasonable security model in Android, but Nikolas Milosevic takes a look at permissions, and how they are exploited for malware purposes.
Waking the Shark 1.5
There is no doubt that we are living in a time of recognised cyber adversity, but are we winning the battle against cyber crime? John Walker investigates.
The Shattered Project, Part 2
Jonathan Rajewski and the team continue the forensic investigation into Google Glass and the development of the automated Python script – Shattered.
Solving The Cyber Skills Challenge
Many initiatives have been rolled out aiming to address the fourth objective within the UK National Cyber Security Strategy. Rob Nowill investigates.
Forensic Implications of Vehicle GPS Accuracy
The use of Global Positioning Systems (GPS) for car navigation has highlighted problems that may have implications for investigators, as Brian Cusack explains.
Forensic Readiness: Is Your Organization Ready?
Mohamed Elyas and the team from the University of Melbourne consider the requirements and implications of forensic readiness.
Data Analytics & Fraud Prevention
Greg Mason and Frances McLeod look at the reasons why corporations should consider leveraging data analytics for fraud prevention and detection.
Plus all the regular features.....