dfm covers
 
 

Digital Forensics News

Spam - all day, every day

Print PDF
Spam all day, every day 


Symantec reports that it has seen email levels reach their lowest point in 12 years. While on the surface that is positive, AppRiver's own filters show a contrasting view which does not mirror the same significant decline, this report reveals that spam is an ongoing issue.



Two people a day convicted of sexual abuse against children

Print PDF
Two people a day convicted of sexual abuse against children                       
The NSPCC announced that on average two people are being convicted of child abuse image crimes every day. Christian Berg, CEO and founder of NetClean comments on the fundamental misunderstanding of the scale of the problem.

Read more...

Stegoloader Malware hides exploit code in images

Print PDF
Stegoloader Malware hides exploit code in images
Dell SecureWorks Counter Threat Unit™ Threat Intelligence unit has released information about Stegoloader. Appearing to have been active since 2012, this particular malware uses digital steganography – the art of hiding secret information within a digital image or graphic – to conceal its true nature and to avoid detection.

Read more...

Dispruptive Data Security Key to Outwitting Hackers

Print PDF
Dispruptive Data Security Key to Outwitting Hackers
It is now widely accepted that the enterprise will be subjected to and may even succumb to cyber attack and yet we continue to rely upon a defensive security strategy. A far more effective way to combat the threat is to focus on disrupting the attack while keeping data safe. This article contains some practical do’s and don’ts to help the enteprise transition to a data-centric strategy.

Read more...

Concerns about data privacy online force British consumers to take control

Print PDF
Concerns about data privacy online force British consumers to take control

YouGov research reveals 72 percent of British consumers are concerned about their private information online, UK Information Commissioner (ICO) urges businesses to invest in data privacy.                                                                                           

Read more...

Hilton Honors account flaw

Print PDF
Hilton Honors account flaw
Industry comments following Brian Krebs’ blog details a powerful flaw in the Hilton Hotels site that lets anyone hijack a Hilton Honors account just by knowing or guessing its valid 9-digit Hilton Honors account number.

Read more...

The importance of collecting mobile data in civil litigation cases

Print PDF
The importance of collecting mobile data in Civil litigation cases
Civil litigators who do not consider collecting mobile data risk missing crucial information

Read more...

Yahoo announces innovative authentication mechanism

Print PDF
Yahoo announces innovative authentication mechanism
Yahoo announced recently, a new method of authentication for its services that relies solely on an on-demand generated password that is sent to the user's mobile phone number.
This is not two-factor authentication (which Yahoo already had), but rather single-factor authentication where the single factor is the user's mobile phone.


Read more...

 
Please make cache directory writable.
 

Submit an Article

Call for Articles

We are keen to publish new articles from all aspects of digital forensics. Click to contact us with your completed article or article ideas.

Featured Book

Hacking the Human

Full of ideas and angles that turn day-to-day security management on its head. Hacking the Human by Ian Mann.

Meet the Authors

George Bailey

George Bailey is an IT security professional with over 15 years of experience

 

Coming up in the Next issue of Digital Forensics Magazine

Coming up in Issue 25 on sale from November 2015:


Anti-Virus Evasion
In this series of articles about penetration testing, Andy Swift sheds some light on some of the more interesting techniques, with a focus on techniques that can be combined with basic tools to take an ordinary attack that few steps further. Read More »

DDoS Protection Using Corero
In this article Dan Protich, Senior Network Engineer at Hivelocity, describes Corero’s threat defence system as an “enterprise-grade DDoS mitigation tool”. Read More »

Subscribe today


A Marriage of Bioinformatics & Data Sequencing
In this article we learn all about how the new technology that marries bioinformatics to next-generation sequencing data, is unlocking the clues provided by DNA, using biomarkers to greatly reduce the pool of suspects. Read More »

Every Issue
Plus the usual Competition, Book Reviews, 360, IRQ, Legal

Click here to read more about the next issue