±Forensic Focus Partners

±Your Account


Nickname
Password


Forgotten password/username?


Membership:
New Today: 3
New Yesterday: 5
Overall: 27497
Visitors: 50

±Follow Forensic Focus

Join our LinkedIn group

Subscribe to news

Subscribe to forums

Subscribe to blog

Subscribe to tweets

Page 407

Forensics is not just a word for cops

Wednesday, August 31, 2005 (22:08:42)
Last year, two employees of AdvantaCare Health Partners resigned and launched their own start-up. Prior to leaving, they copied patient databases, confidential business plans, and other trade secrets, and used this information to compete with AdvantaCare. Before leaving, they tried to conceal what they had done by deleting copied files. This case, which is common at companies with valued intellectual property (IP), was resolved through computer forensics. With IP theft, or compromised customer privacy data stored electronically, an effective computer forensics examination will identify those responsible...

More (SC Magazine)

Group honors high-tech work on BTK

Friday, August 26, 2005 (07:33:16)
A Wichita police detective who helped solve the BTK murder cases has won an international crime investigation award. Detective Randy Stone, whose computer sleuthing provided a turning point in the hunt for BTK, will be given an award for "forensics investigation case of the year" by the International High Technology Crime Investigation Association next week at its conference in Monterey, Calif. The association is also presenting an award to the Wichita Police Department's computer crimes lab as a whole, and another award to the FBI's regional computer forensic laboratory in Kansas City, Mo., for its work on the BTK case...

More (Kansas.com)

Storm brewing over SHA-1 as further breaks are found

Thursday, August 25, 2005 (21:27:09)
Three Chinese researchers have further refined an attack on the encryption standard frequently used to digitally sign documents, making the attack 64 times faster and leaving cryptographers to debate whether the standard, known as the Secure Hash Algorithm, should be phased out more quickly than planned. The attack, presented last week at the Crypto conference in Santa Barbara, Calif., would allow a forger to create two documents that return the same digital fingerprint, a short sequence of numbers that represent the contents of a much larger document...

More (SecurityFocus)

Computer Forensics and Its Impact on Employment Litigation

Thursday, August 25, 2005 (09:04:36)
Computer forensics is becoming a routine part of many employment cases. To cite a few recent examples handled by our firm: After a key employee suddenly resigned, the employer hired a computer forensics company to search the hard drive of the employee's work computer. The search uncovered in "unallocated space" (the place where files go when they are deleted) a business plan that described in detail how he was planning to compete with the employer once he left, including a detailed section on how the employer's biggest client would become his own...

More (RJ&L LLP)

New forensic software released

Monday, August 22, 2005 (09:02:32)
With a raft of bogus bank Web sites and phishing scams flooding computers, it would appear that crime has gone dotcom like everything else. However, a new forensic tool has stepped into the computer crime scene to help search, not a suspect's home, but his hard drive for evidence. Friday saw the release of the Digital Evidence Search Kit (DESK), a computer forensic search tool designed by the Hong Kong University in collaboration with the police...

More (The Standard)