Sunday, March 16 2025
dfm-31

DDoS Mobile

DDoS has developed into a new type of DoS known as Low-rate DDoS. Using this type of DDoS attack, the attackers may now launch an attack using mobile SMART devices such as SMART phones. Raymond Lutui and Brian Cusack investigate.

Vehicle Forensics

There is Value in Vehicle Data! A vehicle is now one of the most complex consumer items and with complexity comes opportunity and criminals utilise them in most crimes. Jim Ogilvie looks at Connected Vehicle Forensics and Driver Attribution.

GNSS Spoofing

Dangers in GNSS Spoofing! Published cases suggest that sinister anti-forensic activities are being perpetrated through a multiplicity of GNSS vulnerabilities. Brian Cusack continues his investigation into GNSS and how Validation Of Vulnerable Data Requires Action.

Data Destruction

In the next of his series of articles Nihad Hassan looks at Data Destruction Techniques and how to delete your Digital Traces in the Windows Operating System and stop the system recording your previous actions.

Machine Learning

Why should we try to spot a cybercriminal’s every possible move when machine learning could help us do it automatically? Is Machine Learning cyber security’s next big investment? Andy Heather investigates.

SMART Meters

Information security is a growing concern for utility companies, as they deal with myriad of data from their smart meters, operations, customers and the power grid. Ronald Herman’s considers the problems and a possible solution from Honeywell.

Bitcoin Forensics

Attempts to investigate the identification and traceability of Bitcoin related artefacts found it extremely difficult to reveal the identity of the user. Saleh Al Himali and Haider al Khateeb take a look.

Read Now

Discover more from Digital Forensics Magazine

Subscribe now to keep reading and get access to the full archive.

Continue reading