+

ATTENTION! If You're from the US and You'd like to buy a subscribtion please contact us directly at email: joanna.kretowicz@eforensicsmag.com

Archive for / 'News'



March 7, 2014

News Partners joanna_kretowicz Comments Off

Access Data Group – official patron of eForensics Magazine

AccessData Group Overview AccessData Group has pioneered digital investigations and litigation support for more than twenty years and is the maker of the industry-standard computer forensics technology, FTK, as well as the leading legal review technology, Summation. AccessData provides a broad spectrum of stand-alone and enterprise-class solutions that enable digital investigations of any kind, including […]

Read more


February 24, 2014

News admin Comments Off

Tone at the Top – Today’s Biggest Cyber-Security Weakness. By Rob Benjamin.

Tone at the Top – Today’s Biggest Cyber-Security Weakness by Rob Benjamin, CRISC, CGEIT   New and increasingly sophisticated threats to personal, corporate, and government data are raising the most serious challenges to IT Security ever seen. Advanced Persistent Threats, “Ransomware” and other, previously unknown attack methods are being used to either employed not by […]

Read more


February 21, 2014

News admin Comments Off

Making Information Security Governance Sexy Again. By Jason Broz.

Full issue on ISG coming soon:  INFORMATION SECURITY GOVERNANCE – PREORDER Making Information Security Governance sexy Again By Jason Broz, SecureState Audit and Compliance Consultant. What is your Organization doing to ensure Business Initiatives are being carried out? Information security governance isa process that aligns Information Security practices, including legal and regulatory compliance, with strategic business […]

Read more


February 21, 2014

Computer Magazine News joanna_kretowicz Comments Off

StarterKit PACK – Digital Forensics

Wanna make real steps into Digital Forensics and give yourself access to complex knowledge? Need a guidance and practical tips? Are you a student and cannot afford our subscription? We have something for you! Get equipped, get prepared and make real progress!  STARTERKIT PACK is waiting for you! Only now we have for you special package for everyone […]

Read more


December 23, 2013

News joanna_kretowicz Comments Off


December 19, 2013

News joanna_kretowicz Comments Off

CHRISTMAS GIFTS LIST FOR eFORENSICS READERS

How can you turn digital forensics into an idea for a Christmas present?   Dear Readers and Experts, The snow is already here (not sure about your parts of the globe), the lights are already on, the streets are decorated and the shopping malls are overcrowded. At eForensics editorial office we decided to put a […]

Read more


December 13, 2013

Free Articles News joanna_kretowicz Comments Off

Keep Your Web Applications Secure – FREE TEASER

Dear Readers, Our new issue „Keep Your Web Applcations Secure” is going to be published on Monday but now you have a chance to check free teaser of the issue! Enjoy!   1. STEP BY STEP GUIDE TO APPLICATION SECURITY PENETRATION TEST. WEB APPLICATION SECURITY by Abhishek Dashora This document will guide you to penetrate the […]

Read more


December 10, 2013

Free Articles News admin Comments Off

HOW TO EXTRACT CLEAR FACTS FROM BAD VIDEO

HOW TO EXTRACT CLEAR FACTS FROM BAD VIDEO by Doug Carner There are literally hundreds of programs claiming to improve video quality, but no one program can be the magic bullet to every situation.  Limited time and budgets prevent the application of every software combination.  A reasonable balance is to primarily rely upon well written […]

Read more


October 28, 2013

Free Articles News joanna_kretowicz Comments Off

Apple goes biometrics

What you will learn: Basic Information about how the Apple iPhone 5S Touch ID-technology works Basic information on fingerprinting technology Risks with using Apple iPhone 5S Touch ID Possible methods for hacking passwords What you will not learn: How to hack Apple iPhone 5S digitally Detailed functionality Apple iPhone 5S Touch ID Countermeasures hacking passwords […]

Read more


October 1, 2013

News admin Comments Off

PTK Forensics as a reward – the second round!

Dear eForensics Readers! DFLabs offers 2 licenses of PTK Forensics for eForensics readers. ​​ ​​​ ​THE CONTEST Please, find the question set below. Send your answers until Oct 14 to artur.inderike@eforensicsmag.com. 1) In an NTFS file system, what is the meaning of the MACB attributes of a file? 2) What is the native UNIX command for cloning […]

Read more

IT MAGAZINES: Hakin9 Magazine | Pentest Magazine | eForensics Magazine | Software Developer's Journal | Hadoop Magazine | Java Magazine
IT Blogs: Hakin9 Magazine Blog | Pentest Magazine Blog | eForensics Magazine Blog | Software Developer's Journal Blog | Hadoop Magazine Blog | Java Magazine Blog
IT ONLINE COURSES: Pentest Laboratory
JOB OFFERS FOR IT SPECIALIST: Jobs on Hakin9 Magazine | Jobs on Pentest Magazine | Jobs on eForensics Magazine | Jobs on Software Developer's Journal | Jobs on Java Magazine | Jobs on Hadoop Magazine
Hakin9 Media Sp. z o.o. Sp. komandytowa ul. Postępu 17D, 02-676 Warszawa