dfm covers
 
 

News

Click Here for the latest Digital Forensics & Cyber Crime News

CLICK HERE NOW TO Get all the latest News Directly from our BLOG
All our lastest news is published directly on our blog where you can provide feedback, comments and connect directly with us @DFMag.


Read more...

Two people a day convicted of sexual abuse against children

Two people a day convicted of sexual abuse against children                       
The NSPCC announced that on average two people are being convicted of child abuse image crimes every day. Christian Berg, CEO and founder of NetClean comments on the fundamental misunderstanding of the scale of the problem.

Read more...

Stegoloader Malware hides exploit code in images

Stegoloader Malware hides exploit code in images
Dell SecureWorks Counter Threat Unit™ Threat Intelligence unit has released information about Stegoloader. Appearing to have been active since 2012, this particular malware uses digital steganography – the art of hiding secret information within a digital image or graphic – to conceal its true nature and to avoid detection.

Read more...

Dispruptive Data Security Key to Outwitting Hackers

Dispruptive Data Security Key to Outwitting Hackers
It is now widely accepted that the enterprise will be subjected to and may even succumb to cyber attack and yet we continue to rely upon a defensive security strategy. A far more effective way to combat the threat is to focus on disrupting the attack while keeping data safe. This article contains some practical do’s and don’ts to help the enteprise transition to a data-centric strategy.

Read more...

Concerns about data privacy online force British consumers to take control

Concerns about data privacy online force British consumers to take control

YouGov research reveals 72 percent of British consumers are concerned about their private information online, UK Information Commissioner (ICO) urges businesses to invest in data privacy.                                                                                           

Read more...

Hilton Honors account flaw

Hilton Honors account flaw
Industry comments following Brian Krebs’ blog details a powerful flaw in the Hilton Hotels site that lets anyone hijack a Hilton Honors account just by knowing or guessing its valid 9-digit Hilton Honors account number.

Read more...

The importance of collecting mobile data in civil litigation cases

The importance of collecting mobile data in Civil litigation cases
Civil litigators who do not consider collecting mobile data risk missing crucial information

Read more...

Yahoo announces innovative authentication mechanism

Yahoo announces innovative authentication mechanism
Yahoo announced recently, a new method of authentication for its services that relies solely on an on-demand generated password that is sent to the user's mobile phone number.
This is not two-factor authentication (which Yahoo already had), but rather single-factor authentication where the single factor is the user's mobile phone.


Read more...

PCI compliance on the rise

PCI Compliance up 20% from 2014
The number of organisations that fully complied with the payment card industry (PCI) security standards during 2014 rose to 20%


Read more...

Understanding the FREAK flaw

Expert provides understanding of the FREAK flaw
AlienVault Senior Product Manager Andy Manoske provides an insight into this latest threat.


Read more...

 
Please make cache directory writable.
 

Submit an Article

Call for Articles

We are keen to publish new articles from all aspects of digital forensics. Click to contact us with your completed article or article ideas.

Featured Book

Learning iOS Forensics

A practical hands-on guide to acquire and analyse iOS devices with the latest forensic techniques and tools.

Meet the Authors

George Bailey

George Bailey is an IT security professional with over 15 years of experience

 

Coming up in the Next issue of Digital Forensics Magazine

Coming up in Issue 37 on sale from November 2018:


Crowd Sourcing Digital Evidence The Risk v The Reward

All digital devices used today can be considered as a potential source for digital evidence. Andrew Ryan investigates the current state in the art of crowd sourced digital evidence. Read More »

Recovery of Forensic Artifacts from Deleted Jump-List in Windows 10

Jump-Lists are widely discussed in forensics community since the release of Windows 7 and are having more capabilities to reveal forensics artifacts in Windows 10. Read More »

Subscribe today


Voice Biometrics

This article looks at the research and development in the field of Voice Biometrics and Speech Analytics, specifically Speaker Identification, Language and Gender Identification, Speech-to-Text Transcription, Keyword Spotting, and others. Read More »

Every Issue
Plus the usual Competition, Book Reviews, 360, IRQ, Legal

Click here to read more about the next issue