Monday, March 17 2025
dfm-28

Chromecast 2.0 - Log Extraction & Analysis

The Google Chromecast 2nd generation is a dongle device that connects to televisions with an HDMI input, facilitating streaming of media. Imraj Dhaliwal, Dr. Haider M. Al-Khateeb and Dr. Gregory Epiphaniou investigate potential evidential artefacts' from this device.

Image Visualisation and Content Identification Using Mathematica

Mathematica is a commercial mathematics and symbolic computing software framework, unlike anything in the investigator’s software toolbox. Richard Carbone’s second significant article in the series looks at how to use this particular software to analyse large data sets of images.

Careers in Cyber Security

Information Security is a viable career option. Terry Neal provides a structured approach to planning your career in cyber security.

Security Guidance For Critical Areas Of Embedded Computing

Can we secure the Internet of Things (IoT) before it is too late? Art Swift from the prpl (pronounced ‘Purple’) investigates.

Semantic Trust In What We Own

Shall we or shan’t we tell how to open an iPhone? Brian Cusack discusses the saga of Apple vs the US Government and the wider implications.

Cloud Honeypots

How feasible is a distributed Honeypot deployment in the Cloud? Simon Clary and Adrian Winckles investigate.

Plus all the regular features......

Read Now

Discover more from Digital Forensics Magazine

Subscribe now to keep reading and get access to the full archive.

Continue reading