eForensics Mobile 1/2012
Active subscribers – To download this issue, click on the cover of the magazine on the main website or scroll down this page and click the Download button. Single issue buyers – After paying for this issue, click “eForensics Mobile_1/2012_2012/08/23″ (which will show just above that text) to download your copy of the magazine.
INTERVIEW WITH CHRISTIAAN BEEK
by Vaman Amarjeet and eForensics Team
Christiaan Beek – the expert of this month’s issue – is answering questions concerning digital forensic investigation and incident response.
by Larry Smith, Donald Cinco
In this article, Larry Smith and Donald Cinco present what they discovered after the installation of a ‘social share’ widget.
SIP CALL FORENSIC ANALYSIS
by Jan Tilo Kirchhoff
It all started during my 2011 summer vacation. One evening my mobile started ringing but when I finally got to it and accepted the call there was no one on the line…. Jan Kirchhoff presents the investigation he conducted in order to detect the source and reason of the mysterious calls.
ISSUES IN MOBILE DEVICE FORENSICS
by Eamon Doherty, PHD, SSCP, CCP, CCE
This article discusses examples of usage of these mobile devices and accessories and the tools, that one may encounter on suspect during an investigation.
MOBILE PHONE FORENSICS: CHALLENGE OF THE FUTURE
by prof. M. Tahar-Kechadi, dr Lamin Aouad
This article shares some thoughts about the reasons leading to the rapid development of mobile ecosystems.
HOW CAN SOFTWARE HELP SMARTPHONE FORENSICS?
by Alessandro Distefano
The author presents how Software Mobile Forensics can ease several concerns of the current Mobile Forensics tasks.
AN INTRODUCTION TO NETWORK ANALISYS
by Scott Taylor
Scott Taylor shows some helpful tricks, which may come in handy when a problem with traffic identification or other operational activities arises.
ANDREW HOOG “ANDROID FORENSICS”
by Apurva Rustagi
Apurva Rustagi, in his review of “Android Forensics”written by Andrew Hoog, writes about the distinctive qualities of this book. He persuades that this publication won’t disappoint any forensic practitioner, irrespective of their ‘stage of initiation’.
CYBER AGENTS: HACKING EXTORTION CASE
by Eric Lakes
In this story, Eric Lakes and sergeant Randy, investigators at Cyber Agents do their best to prove their client innocent and to outwit his smart wife.
INTEGRATING CYBER FORENSICS IN INCIDENT RESPONSE
by Mukesh Saini
The article deliberates over the necessity and importance of the DEFR in an organization, private company or a government department.
SECURITY TESTING TOOL OR CYBER WEAPON
by Kevin Coleman
In this article, Kevin Coleman stresses the burning need to provide clear distinction between Security Testing Tool and Cyber Weapon. His surprising remarks clearly pertain to the problem of nomenclature in the current regulatory system.
- Register, accept the Disclaimer and choose subscription option.
By choosing the Free Account option you will only be able to download the teaser of each issue.
- Verify your account using the verification link sent to your email address.
- Check the password sent on your email address and use it to log in.
- Click the download button to get the issue.
IMPORTANT: the registration on the website includes subscription to our newsletter.