Saturday, March 15 2025
DFM19Cover

What are the Core Skills for Cyber?

After being asked to provide a review by the National Technical Authority for an MSc in Cyber Security, Roy Isbell looks at the core skills needed for Cyberspace.

NTP DOS

Having just finished his new book: “Cyber Attack, CyberCrime, CyberWarfare – CyberComplacency”; Mark Osborne investigates the latest NTP DDOS attacks.

Session Spoofing Attempts on the XBOX

Brian Cusack and Nick Robinson investigate the security of the Xbox and talk about the results achieved following an attempt using 3 different attacks.

Harvesting Windows Creds from Volatile Storage

What artefacts can be extracted from the volatility memory in Windows, and what makes memory a significant part of any digital forensic methodology?

Google Glass III - Analysing Google Glass Events

Jonathan Rajewski and the team complete the series of articles on forensic investigation of Google Glass and the analysis of Google Glass Events.

Investigating Teen Dating Violence

To appreciate the role mobile phones play in teen dating violence, it’s important to understand the pervasiveness of mobile device usage amongst teenagers.

Programming The Wetware

This is the first in a 2-part article by Keith Scott investigating some of the wider human factors that have a direct effect on information security.

How Automation Tools Can Bridge the Skills Gap

Sophisticated automation solutions offer government agencies and private-sector organisations the necessary tools to stop cyber attacks in their tracks.

Incident Response

CSIRT, First Responder Capabilities, Cyber Forensics and Incident Response are topics high on the agenda but low in capability. John Walker investigates.

Protecting Intellectual Property in the Cloud

Reza Khaleghparast and Brian Cusack look at the possibility of using watermarks to protect intellectual property in the Cloud.

Plus all the regular features......

Read Now

Discover more from Digital Forensics Magazine

Subscribe now to keep reading and get access to the full archive.

Continue reading