More (Navhind Times)
±Partners and Sponsors
New Today: 6
New Yesterday: 2
±Follow Forensic Focus
· Understanding Cyber Bullying – Notes for Digital Forensics Examiners
· Investigating the Dark Web – The Challenges of Online Anonymity for Digital Forensics Examiners
· The Complete Workflow of Forensic Image and Video Analysis
· Browser Anti Forensics
· Coming apart at the SIEMs …
· WeChat Forensics
· DFRWS Europe 2014 Annual Conference – Recap
· Considering A Career in Audio-Video Forensics? Enhance Your Prospects With Continuing Education
· Forensics Europe Expo 2014 – Recap
Page 446Back to top Back to main Skip to menu
More (Navhind Times)
"You have to be prepared for anything; criminals are crafty," Marsico said.
After graduation in May, Marisco hopes to work for the FBI. But for now, his concern is developing a standard practice regarding how digital evidence may be used in court.
More (The Exponent)
"I would like to notify you that the table of contents of the third issue of Digital Investigation is now available at http://www.digitalinvestigation.net. We are pleased to be able to offer two articles from this issue free of charge, available to download now.
Reporting security breaches: A risk to be avoided or responsibility to be embraced? Editor in chief, Eoghan Casey, debates whether companies should or shouldn't report incidents to the police. If faced with more corporate reporting could law enforcement cope?
Tool Review: Forensic analysis of windows hosts using UNIX-based tools Most examiners only use UNIX-based forensic tools when investigating a UNIX system. However, such tools are excellent for examining Windows hosts. Cory Altheide writes a 16 page technical report on how to use Linux as a platform for forensic analysis and all the advantages it can bring to an investigation.
Download these articles at http://www.digitalinvestigation.net"
is now online and we're actively looking for contributions. If you would like to submit a paper or article for publication at Forensic Focus please mail me at email@example.com, thank you.
A computer forensics study into the latest Mini iPod, conducted by corporate investigators The Risk Advisory Group (TRAG), shows that mobile devices can be used to easily download vast amounts of confidential company information...
More (Personnel Today)