Recovering User Passwords from Memory
Haider M. al-Khateeb takes a look at the tools and techniques to recover user credentials from Windows memory dumps.
Investigating Steganography in Audio Streams
Brian Cusack and James Lu Yao investigate the tool selection that is crucial to detecting hidden content in audio streams.
Forensic Droplets & Puddles
Michelle Govan investigates the exchanging of data between devices using the hydrological cycle.
The Convergence of IT Security & Physical Access Control
Harm Radstaak looks at using a Single Credential to Secure Access to IT and Physical Resources.
Action Items for Protecting Data Across Systems
Maor Goldberg looks at how to establish and monitor administrator permissions and get control of organisational data, providing tables as possible checklists.
Programming The Wetware
Keith Scott suggests how certain aspects of human psychology and behaviour may offer ways to influence a user’s actions in the information realm.
Cyber Security Attributes for Critical Infrastructure Systems
Hugh Boyes looks at how Information Assurance professionals rely on the Confidentiality, Integrity and Availability triad to define security requirements.
Adding ZFS Events to a Super-Timeline
Dylan Leigh and Dr. Hao Shi present an extension to Plaso, which can add ZFS events to a timeline and show how to generate a super-timeline from a ZFS pool.
Introducing the Cyber Scheme
Brian Moore provides some background to the newly launched Cyber Scheme.
Plus all the regular features......