SQLite Databases Treasure Trove for the Digital Forensicator - Part 1
In this multi part article, Dr Kala Baskar takes a look at what SQLite is and how to build a forensic methodology, supported by a case study.
Improving Image Recovery Rates in Big Data
In our feature article, Dr. Brian Cusack and Dan Fraser provide the results of their research into image identification following the development of a new tool called “Hash Based Image Retrieval”.
Recovering Cryptographic Keys from Memory
Haider M. al-Khateeb and Emilija Strelcenia investigate the techniques and tools to recover cryptographic keys from Windows memory dumps.
Information Security & Digital Forensics in the World of Cyber Physical Systems
Dr Andy Jones investigates this emerging and growing area of Cyber that is set to become a significant aspect of future investigations.
Exploring Network Element Vulnerabilities
In this research article Raymond Lutui and Brian Cusack investigate the Security Weaknesses in the IPv6 to 4 Tunnel protocols.
Now is the Time for Security Analytics
Scott Crane from Arbor Networks takes a look at security analytics and the future.
The Dawn of a New Era in E-Mail Security
Richard Cassidy takes a look at this 15-year-old technology and what is needed to improve the security of our communications.
Advanced Persistent Threat
There has been significant research into ways to improve existing controls and developing new methods of addressing APT. Halidu Abubakar examines the effectiveness of those controls against APT.
Things in the Saddle – Narratives for the Cyber–Physical Age
Keith Scott in his inimitable style looks at the emergence of Cyber Physical Systems and how they are set to impact on our lives, however to get us all to accept them, we have to set the narrative.
Plus all the regular features......