dfm covers
 
 

In This Issue

Written by DFM Team


Issue 22 - Out now!

Here's a quick review of some of the main articles within Issue 22


Issue 22 of Digital Forensics Magazine brings new techniques and ideas to the industry. Subscribe today to ensure you get digital access, or if you want, subscribe to the print edition. Find out more at our subscriptions pages.

Here's just a few of the fantastic articles inside Issue 22...


SQLite Databases: Treasure Trove for the Digital Forensicator ? Part 2

In the second part of this multi part article, Dr Kala Baskar takes a look at one of the most widely used databases in mobile devices and other technology, SQLite. In this second part looks at an intelligent approach used when extracting SQlite database evidence from personal computers.


Improving SMART Phone Investigation Methods

In this article, Dr. Brian Cusack & Raymond Lutui provides the results of their research into 13 digital forensic investigation models to assess their ability to handle the new world of SMART devices and cloud computing.


Internet-of-Things: Towards a Forensic Methodology

Haider M. al-Khateeb and Edewede Oriwoh investigate ideas towards incident response strategies for Internet of Things (IoT) Based Crimes.


Drilling into the Big Data Goldmine

Peter Snelling Principal Technical Consultant from SAS looks at How Intelligence Professionals Can Reap the Rewards of Data Fusion and High-Performance Analytics.

The Deep Web, Darknet & Dark Internet

This article by Hugh Boyes explores the nature of the majority of connections made to the Internet that are not indexed by search engines.


Cyber Security & The Small to Medium Enterprise (SME)

The SME is considered the backbone of the UK economy. In this article we consider the cyber environment that the SME operates and the resources available to help them navigate the often complex and unknown world they find themselves in.


Malicious Tool Providing Attackers With A New Type of Zombies

In this short piece by Ben Campbell he raises the awareness of attacks that are already taking place against the Internet of Things and the toolkits that are already in the wild.

Protecting Information in Local Public Services

Following a data handling review in 2008 Mark Brett provides an update on the UK Local Public Sector Data Handling Guidelines V3 and how they came about.



Plus all the regular features, news, our legal section and From The Lab...


Login to read online or Subscribe today!



 
 

Submit an Article

Call for Articles

We are keen to publish new articles from all aspects of digital forensics. Click to contact us with your completed article or article ideas.

Featured Book

Learning iOS Forensics

A practical hands-on guide to acquire and analyse iOS devices with the latest forensic techniques and tools.

Meet the Authors

Noemi Kuncik

Noemi Kuncik is an IT Forensics Specialist at Grant Thornton

 

Coming up in the Next issue of Digital Forensics Magazine

Solving the Security Challenges with a Human Firewall

The Next Generation Human Firewall, fully trained and ready to act on security threats with the right tools at their disposal needs to meet the needs of a securely distributed, flexible, integrated modern workforce.


Fraudulent Use of Digital Images and Detection Survey

This article looks at the basic concepts related to image forgery; the types, detection procedure algorithms and all possible techniques to detect malicious signatures including a comparative analysis.

Subscribe today





Discovery in the Cloud: An Investigator’s Close Look at Unexpected Risks and Challenges

Documents residing in cloud storage accounts are increasingly coming into scope in digital forensic investigations such as IP theft, regulatory, corruption, merger clearance and civil matters. Organisations may be obligated to place preservation holds on data residing in cloud storage, collect documents from cloud accounts and produce this data to regulators or courts.

Every Issue

News, 360, IRQ, Legal