Digital Forensics Magazine Third Edition is Now Online

The third edition of Digital Forensics Magazine was published online at the start of the May. The publishers give us a taster of what subscribers can find inside.

London, United Kingdom, May 05, 2010 --( Digital Forensics Magazine is a collection of features, news, reviews and articles concerning all matters dealing with the rapidly growing market of digital forensics and cyber security. Recent reports estimate this market to be worth £4-5bn each year at present. The most recent edition of DFM was published online on May 1st this year and within the latest edition can be found some of the following articles:

You Have Mail - Email started life as a novelty and has risen to become a necessity. But the speed, flexibility and low costs of email communication have been turned into a weapon. From spam to spear phishing, your inbox can place you one click away from disaster. In fact, you don’t even need to click to be in danger. How can you tell the good from the bad, the genuine from the fake? How is a deceptive email constructed and how can it be spotted? Tim Watson explains how vulnerable email protocols can be abused and how to catch those who do it in issue 3 of Digital Forensics Magazine.

Mention the word ‘malware’ in a word association game and few people would think to respond with ‘weapon.’ Malware is nearly always a means to an end in a much bigger picture. This could be the sale of information obtained, access to the compromised system or even the denial of access for the right price. Visualising the computer as the battlefield and a network or computer system as a region or country then a malware attack becomes an offensive campaign against targeted systems. Ian Kennedy takes us on a journey of discovery into what makes malware tick in the article, "Playing With Fire: Dissecting Malicious Software," in the latest edition of Digital Forensics Magazine.

Scott Zimmerman follows up on his article from Issue 2 on Proactive Computer Forensics with this detailed look into the requirements of the US's Computer Fraud and Misuse Act and the UK's Computer Misuse Act (1990). If there is a chance that a forensic investigation could result in prosecution, the evidence gathering process should include events, actions and other data points that are related to specific legal statutes. As a guide to identifying these events, in issue 3, Digital Forensics Magazine examines two pieces of legislation: the Computer Fraud & Abuse Act from the US and the Computer Misuse Act 1990 from the UK.

Readers can find out more about these, and other articles, in the latest edition of Digital Forensics Magazine. The third edition was published on May 1st. Please visit www.digitalforensicsmagazine to find out more; online subscriptions to the quarterly periodical start from under £30.

Digital Forensics Magazine
Matthew Rahman
0845 170 7770