UDP Based Amplification Attacks
We’ve all heard of a Denial of Service Attack (DDoS), and some of us may have heard of a Distributed Reflective Denial of Service Attack (DRDoS). They are synonymous to both the reflection attack in traditional terms and to the more best of breed amplification attacks. Desmond Collins explains.
Network Permissions
Jim Scarazzo helps us understand the steps to collect and evaluate folder access data to streamline complex e-discovery efforts.
Cloud Technology Vulnerabilities
Virtualisation technologies are vulnerable to all the attacks that are found in software applications and networking environments. The big difference however is that virtualisation technologies are software and hardware complexities that add extra layers of potential for attack. Brian Cusack investigates.
Vehicles Solve Crime
Two global industry leaders align to offer investigators unparalleled capabilities for Data Extraction and Vehicular Forensics. Josh Grossman explains the thoughts behind the collaboration.
The Insider Threat
Jamie Graves takes a look at how organisations are affected by the insider threat, and how machine learning is helping us catch up.
Mathematica
Richard Carbone continues his series of articles into advanced image visualisation and image content identification (ICI) using Mathematica.
Plus all the regular features......