
Source Code Verification
Does Open Source Software Forensics hold the keys to better validation and Peer Code Review? Desmond Collins investigates.
Attacking Encryption
This article by Nihad Hassan investigates the attack methods and how to respond to such attacks
Plain Text Vulnerabilities in Wearable Technologies
How Confidentiality and Integrity are compromised by Accessibility, Gerard Ward and Brian Cusack investigate.
Triage Solution for Sex Offender Managers
Daniel Caranese with support from Adrian Winckles and DS Richard Oliver investigate the problems and develop a solution for managing sex offenders.
Seeing Beyond the Image
How do we authenticate an image, Martino Jerian investigates the various aspects of this intractable problem.
Extracting Data from Androids Instant Messaging & Social Media Apps
Moses Ashawa, Ali Mansour & Haider M. alKhateeb provide Evidence Extraction using Open Source and Commercial Tools.
Plus all the regular features......