
Data Leakage Issues in Smartphones
Jeryn Charly and Brian Cusack investigate the ever-increasing number of Smartphones and applications being utilized for processing all manner of information raising the issue of information ownership
Cyber Security Operations 101
New Author Andy Moore takes a look at the fundamentals of preparing for, and responding to, the inevitable breach.
Online Tracking Techniques and Countermeasures
There are different actors interested in tracking internet users with different motivation for each one. Nihad Hassan explains Online Tracking and How to Counter the Trackers.
Unexpected Payloads in Unexpected Places
Digital forensics practitioners are accustomed to finding artefacts on hard drives, USB sticks, phones, and external storage, Rick Leinecker explains how to find hidden evidence in web pages.
Plus all the regular features......