
Interpreting Email Headers
Tim Watson explains how vulnerable email protocols can be abused and how to catch those who do it.
Proactive Computer Forensics
Scott Zimmerman discusses how to gather and store event-related information appropriately.
The Facebook Murder
John Olsson illustrates how text messaging can be used for ill-means by linguistic masterminds.
A Digital Forensics Lab by any Other Name
Digital forensics laboratories may once have been specialised, but increasing case complexity demands broader capabilities across disciplines.
Dissecting Malicious Malware
Modern malware is more sophisticated than it used to be and can easily mislead the investigator.
Modelling for Operational Forensics
Barry Hood shows how modelling paradigms can be used to guide a simple psychosocial forensic analysis.
It's Not About Prevention
Steve Shillingford explains why there is an urgent need for preparedness in cybersecurity.
Time For Forensics
Paul Tew discusses how to understand and effectively investigate digital time stamps.
Introduction to Steganography
Jim Wingate shows us how to uncover hidden information.
Plus all the regular features......