Thursday, November 7 2024
dfm-30

UDP Based Amplification Attacks

We’ve all heard of a Denial of Service Attack (DDoS), and some of us may have heard of a Distributed Reflective Denial of Service Attack (DRDoS). They are synonymous to both the reflection attack in traditional terms and to the more best of breed amplification attacks. Desmond Collins explains.

Network Permissions

Jim Scarazzo helps us understand the steps to collect and evaluate folder access data to streamline complex e-discovery efforts.

Cloud Technology Vulnerabilities

Virtualisation technologies are vulnerable to all the attacks that are found in software applications and networking environments. The big difference however is that virtualisation technologies are software and hardware complexities that add extra layers of potential for attack. Brian Cusack investigates.

Vehicles Solve Crime

Two global industry leaders align to offer investigators unparalleled capabilities for Data Extraction and Vehicular Forensics. Josh Grossman explains the thoughts behind the collaboration.

The Insider Threat

Jamie Graves takes a look at how organisations are affected by the insider threat, and how machine learning is helping us catch up.

Mathematica

Richard Carbone continues his series of articles into advanced image visualisation and image content identification (ICI) using Mathematica.

Plus all the regular features......

Read Now

Discover more from Digital Forensics Magazine

Subscribe now to keep reading and get access to the full archive.

Continue reading