±Forensic Focus Partners

±Your Account


Nickname
Password


Forgotten password/username?


Membership:
New Today: 4
New Yesterday: 6
Overall: 27389
Visitors: 65

±Follow Forensic Focus

Join our LinkedIn group

Subscribe to news

Subscribe to forums

Subscribe to blog

Subscribe to tweets

Page 416

Used hard drives betray company secrets

Wednesday, June 01, 2005 (05:12:56)
A study of 200 hard drives bought on eBay this year reveals that over 70 per cent contained sensitive personal or business data. German data recovery firm O&O Software was able to recover 3.3 million files, including 40,000 Word documents, 15,000 Excel spreadsheets and about 50 complete email inboxes. In one case a large German bank left details of customer credit ratings in files which O&O said were only protected by being labelled 'Highly Confidential'. The report also mentions finding what it calls 'onion drives'. These are drives that have been formatted by users and still left with data written onto the hard drive...

More (computing)

New Article: Developing A Framework For Evaluating Computer Forensic Tools

Monday, May 30, 2005 (14:00:41)
A paper by Colin Armstrong (of Curtin University of Technology in Australia) entitled "Developing A Framework For Evaluating Computer Forensic Tools" is now available online.

The paper can be read here.

A list of other articles and papers available at Forensic Focus can be found here, new submissions are always welcome.

EnCase Device Configuration Overlay Data Acquisition Weakness

Monday, May 30, 2005 (07:41:17)
Arne Vidström has reported a weakness in EnCase, which can be exploited to hide information on a disk. The weakness is caused due to missing support of Device Configuration Overlays (DCO) and therefore causes the program to not acquire parts of a disk using this feature. The weakness has been reported in EnCase Forensic Edition 4.18a. Other versions may also be affected...

More (Secunia)

New Paper: The Forensic Chain of Evidence Model

Friday, May 27, 2005 (18:19:57)
A paper by Atif Ahmad entitled "The Forensic Chain of Evidence Model - Improving the Process of Evidence Collection in Incident Handling Procedures" is now available online.

The paper can be read here.

A full list of papers and articles at Forensic Focus can be found here. New submissions are always welcome.

Online crime - new tools, old tricks

Friday, May 27, 2005 (06:51:42)
This week virus writers took a further step into the underworld when they released a Trojan horse program that holds computer data hostage unless you pay $200. The program infects computers through a weakness in Internet Explorer. It finds files with certain extensions, '.doc' for instance, encrypts them and then demands you pay up or never see your data again...Unfortunately, given that UK police resources are creaking under a two-year backlog of computer crime cases, criminals are probably not feeling too much heat...


More (silicon.com)