
Chromecast 2.0 - Log Extraction & Analysis
The Google Chromecast 2nd generation is a dongle device that connects to televisions with an HDMI input, facilitating streaming of media. Imraj Dhaliwal, Dr. Haider M. Al-Khateeb and Dr. Gregory Epiphaniou investigate potential evidential artefacts' from this device.
Image Visualisation and Content Identification Using Mathematica
Mathematica is a commercial mathematics and symbolic computing software framework, unlike anything in the investigator’s software toolbox. Richard Carbone’s second significant article in the series looks at how to use this particular software to analyse large data sets of images.
Careers in Cyber Security
Information Security is a viable career option. Terry Neal provides a structured approach to planning your career in cyber security.
Security Guidance For Critical Areas Of Embedded Computing
Can we secure the Internet of Things (IoT) before it is too late? Art Swift from the prpl (pronounced ‘Purple’) investigates.
Semantic Trust In What We Own
Shall we or shan’t we tell how to open an iPhone? Brian Cusack discusses the saga of Apple vs the US Government and the wider implications.
Cloud Honeypots
How feasible is a distributed Honeypot deployment in the Cloud? Simon Clary and Adrian Winckles investigate.
Plus all the regular features......