±Forensic Focus Partners

±Your Account


Nickname
Password


Forgotten password/username?


Membership:
New Today: 0
New Yesterday: 4
Overall: 27389
Visitors: 40

±Follow Forensic Focus

Join our LinkedIn group

Subscribe to news

Subscribe to forums

Subscribe to blog

Subscribe to tweets

Page 393

Denial of Service prosecution fails

Friday, November 04, 2005 (14:20:53)
A British teenager has been cleared of launching a denial-of-service attack against his former employer, in a ruling that delivers another blow to the U.K's Computer Misuse Act. At Wimbledon Magistrates Court in London, District Judge Kenneth Grant ruled Wednesday that the teenager had not broken the CMA, under which he was charged. The defendant, who can't be named for legal reasons, was accused of sending 5 million e-mail messages to his ex-employer that caused the company's e-mail server to crash...

More (ZDNet)

Expanding computer sleuth company moves to Herndon

Friday, November 04, 2005 (13:20:08)
A team of computer sleuths is hard at work in Herndon, doing everything from telling clients how secure their network to doing computer forensic work to figuring out what files a client's disgruntled employee might have leaked to a competitor. The Emerging Technologies Group Inc. (ETG) recently moved its corporate headquarters to Herndon from Huntsville, Ala., and is waiting on completion of its new 10,000-square-foot space in a Worldgate office building...

More (TimesCommunity.com)

Audit trails and computer forensics

Thursday, November 03, 2005 (11:48:01)
If your employer accuses you of hacking into the company’s computing system and perpetrating a fraud, and you happen to be guilty, what is your safest tactic if you want to escape criminal charges? The answer is: Ask them to prove it. One out of three times, even if computer forensics experts are brought in and given unfettered access to all systems, it will be impossible to prove who is guilty of what. The reason is that few computer networks maintain comprehensive audit trails of who did what and when...

More (CSO)
  • Posted by: jamie
  • Topic: Links
  • Score: 0 / 5
  • (537 reads)

Unlocking the power of computer crime evidence

Wednesday, November 02, 2005 (13:21:05)
Though computer evidence now appears in many cases, UK law is not clear on how to handle all this data. Neil Barrett discusses the measures being considered - and the effect they'll have on computer crime prosecution...

More (silicon.com)
  • Posted by: jamie
  • Topic: Links
  • Score: 0 / 5
  • (565 reads)

IT Security Breach? Don’t just step in CSI Style

Wednesday, November 02, 2005 (00:28:55)
In every company in the UK there is likely to be a PC, and therefore an IT security breach is almost inevitable. These are the findings of the 2005 National High Tech Crime Unit report into the effect of computer crime on businesses. The main concern for said decision makers after a breach had occurred was how to maintain business continuity. However if half of IT staff employed within companies have no formal IT security qualifications, what exactly must you do to stop your business grinding to a halt? Firstly don’t step in guns blazing CSI style – the Channel 5 TV show that is. Although the glossy crime series has brought Computer Forensics to the forefront of public awareness, it does little to reflect the correct and essential procedures that must be put in place once there is suspicion of criminal activity...
  • Posted by: jamie
  • Topic: News
  • Score: 4 / 5
  • (762 reads)