Thursday, November 7 2024
DF21-cover

SQLite Databases Treasure Trove for the Digital Forensicator - Part 1

In this multi part article, Dr Kala Baskar takes a look at what SQLite is and how to build a forensic methodology, supported by a case study.

Improving Image Recovery Rates in Big Data

In our feature article, Dr. Brian Cusack and Dan Fraser provide the results of their research into image identification following the development of a new tool called “Hash Based Image Retrieval”.

Recovering Cryptographic Keys from Memory

Haider M. al-Khateeb and Emilija Strelcenia investigate the techniques and tools to recover cryptographic keys from Windows memory dumps.

Information Security & Digital Forensics in the World of Cyber Physical Systems

Dr Andy Jones investigates this emerging and growing area of Cyber that is set to become a significant aspect of future investigations.

Exploring Network Element Vulnerabilities

In this research article Raymond Lutui and Brian Cusack investigate the Security Weaknesses in the IPv6 to 4 Tunnel protocols.

Now is the Time for Security Analytics

Scott Crane from Arbor Networks takes a look at security analytics and the future.

The Dawn of a New Era in E-Mail Security

Richard Cassidy takes a look at this 15-year-old technology and what is needed to improve the security of our communications.

Advanced Persistent Threat

There has been significant research into ways to improve existing controls and developing new methods of addressing APT. Halidu Abubakar examines the effectiveness of those controls against APT.

Things in the Saddle – Narratives for the Cyber–Physical Age

Keith Scott in his inimitable style looks at the emergence of Cyber Physical Systems and how they are set to impact on our lives, however to get us all to accept them, we have to set the narrative.

Plus all the regular features......

Read Now

Discover more from Digital Forensics Magazine

Subscribe now to keep reading and get access to the full archive.

Continue reading