
What are the Core Skills for Cyber?
After being asked to provide a review by the National Technical Authority for an MSc in Cyber Security, Roy Isbell looks at the core skills needed for Cyberspace.
NTP DOS
Having just finished his new book: “Cyber Attack, CyberCrime, CyberWarfare – CyberComplacency”; Mark Osborne investigates the latest NTP DDOS attacks.
Session Spoofing Attempts on the XBOX
Brian Cusack and Nick Robinson investigate the security of the Xbox and talk about the results achieved following an attempt using 3 different attacks.
Harvesting Windows Creds from Volatile Storage
What artefacts can be extracted from the volatility memory in Windows, and what makes memory a significant part of any digital forensic methodology?
Google Glass III - Analysing Google Glass Events
Jonathan Rajewski and the team complete the series of articles on forensic investigation of Google Glass and the analysis of Google Glass Events.
Investigating Teen Dating Violence
To appreciate the role mobile phones play in teen dating violence, it’s important to understand the pervasiveness of mobile device usage amongst teenagers.
Programming The Wetware
This is the first in a 2-part article by Keith Scott investigating some of the wider human factors that have a direct effect on information security.
How Automation Tools Can Bridge the Skills Gap
Sophisticated automation solutions offer government agencies and private-sector organisations the necessary tools to stop cyber attacks in their tracks.
Incident Response
CSIRT, First Responder Capabilities, Cyber Forensics and Incident Response are topics high on the agenda but low in capability. John Walker investigates.
Protecting Intellectual Property in the Cloud
Reza Khaleghparast and Brian Cusack look at the possibility of using watermarks to protect intellectual property in the Cloud.
Plus all the regular features......