Monday, March 17 2025
Issue3

Interpreting Email Headers

Tim Watson explains how vulnerable email protocols can be abused and how to catch those who do it.

Proactive Computer Forensics

Scott Zimmerman discusses how to gather and store event-related information appropriately.

The Facebook Murder

John Olsson illustrates how text messaging can be used for ill-means by linguistic masterminds.

A Digital Forensics Lab by any Other Name

Digital forensics laboratories may once have been specialised, but increasing case complexity demands broader capabilities across disciplines.

Dissecting Malicious Malware

Modern malware is more sophisticated than it used to be and can easily mislead the investigator.

Modelling for Operational Forensics

Barry Hood shows how modelling paradigms can be used to guide a simple psychosocial forensic analysis.

It's Not About Prevention

Steve Shillingford explains why there is an urgent need for preparedness in cybersecurity.

Time For Forensics

Paul Tew discusses how to understand and effectively investigate digital time stamps.

Introduction to Steganography

Jim Wingate shows us how to uncover hidden information.

Plus all the regular features......

Read Now

Discover more from Digital Forensics Magazine

Subscribe now to keep reading and get access to the full archive.

Continue reading