SQLite Databases: Treasure Trove for the Digital Forensicator - Part 2
In the second part of this multi-part article, Dr Kala Baskar takes a look at an intelligent approach used when extracting SQlite database evidence from personal computers.
Improving Smart Phone Investigation Methods
Dr Brian Cusack and Raymond Lutui provide the results of their research into 13 digital forensic investigation models to assess their ability to handle the new world of SMART devices and cloud computing.
Internet of Things: Towards a Forensic Methodology
Haider M. al-Khateeb and Edewede Oriwoh investigate ideas towards incident response strategies for Internet of Things (IoT) Based Crimes.
Drilling into the Big Data Goldmine
Peter Snelling looks at how Intelligence professionals can reap the rewards of Data Fusion and High-Performance Analytics.
The Deep Web, DarkNet & Dark Internet
This article by Hugh Boyes explores the nature of the majority of connections made to the Internet that are not indexed by search engines.
Cyber Security & The Small to Medium Enterprise
In this article, we consider the cyber environment that the SME operates and the resources available to help them navigate the often complex and unknown world they find themselves in.
IOT BOTNETS: Malicious Tool Providing Attackers With A New Type of Zombies
Ben Campbell raises awareness of attacks that are already taking place against the Internet of Things and the toolkits that are already in the wild.
Protecting Information in Local Public Services
Following a data handling review in 2008, Mark Brett provides an update on the UK Local Public Sector Data Handling Guidelines V3 and how they came about.
PCI DSS Compliance
Adesanya Ahmed explains how to meet the new PCI DSS compliance guidelines.
Plus all the regular features......