Thursday, April 17 2025
dfm33

Source Code Verification

Does Open Source Software Forensics hold the keys to better validation and Peer Code Review? Desmond Collins investigates.

Attacking Encryption

This article by Nihad Hassan investigates the attack methods and how to respond to such attacks

Plain Text Vulnerabilities in Wearable Technologies

How Confidentiality and Integrity are compromised by Accessibility, Gerard Ward and Brian Cusack investigate.

Triage Solution for Sex Offender Managers

Daniel Caranese with support from Adrian Winckles and DS Richard Oliver investigate the problems and develop a solution for managing sex offenders.

Seeing Beyond the Image

How do we authenticate an image, Martino Jerian investigates the various aspects of this intractable problem.

Extracting Data from Androids Instant Messaging & Social Media Apps

Moses Ashawa, Ali Mansour & Haider M. alKhateeb provide Evidence Extraction using Open Source and Commercial Tools.

Plus all the regular features......

Read Now

Discover more from Digital Forensics Magazine

Subscribe now to keep reading and get access to the full archive.

Continue reading