±Forensic Focus Partners

Become an advertising partner

±Your Account


Username
Password

Forgotten password/username?

Site Members:

New Today: 1 Overall: 30572
New Yesterday: 1 Visitors: 50

±Latest Articles

RSS Feed Widget

±Follow Forensic Focus

Forensic Focus Facebook PageForensic Focus on TwitterForensic Focus LinkedIn GroupForensic Focus YouTube Channel

RSS feeds: News   Forums   Articles

Page 241

Search on This Topic: News

[ Go to Home | Select a New Topic ]

EnCase Device Configuration Overlay Data Acquisition Weakness

Monday, May 30, 2005 (07:41:17)
Arne Vidström has reported a weakness in EnCase, which can be exploited to hide information on a disk. The weakness is caused due to missing support of Device Configuration Overlays (DCO) and therefore causes the program to not acquire parts of a disk using this feature. The weakness has been reported in EnCase Forensic Edition 4.18a. Other versions may also be affected...

More (Secunia)

New Paper: The Forensic Chain of Evidence Model

Friday, May 27, 2005 (18:19:57)
A paper by Atif Ahmad entitled "The Forensic Chain of Evidence Model - Improving the Process of Evidence Collection in Incident Handling Procedures" is now available online.

The paper can be read here.

A full list of papers and articles at Forensic Focus can be found here. New submissions are always welcome.

Online crime - new tools, old tricks

Friday, May 27, 2005 (06:51:42)
This week virus writers took a further step into the underworld when they released a Trojan horse program that holds computer data hostage unless you pay $200. The program infects computers through a weakness in Internet Explorer. It finds files with certain extensions, '.doc' for instance, encrypts them and then demands you pay up or never see your data again...Unfortunately, given that UK police resources are creaking under a two-year backlog of computer crime cases, criminals are probably not feeling too much heat...


More (silicon.com)

Montana agencies left private information on discarded computers

Thursday, May 26, 2005 (08:33:53)
State agencies failed to remove private information before retiring outdated state computers, risking public disclosure of Social Security and credit card numbers, medical records and income taxes, a new report discloses. The legislative audit, obtained Tuesday, blamed unclear state policy for the computer hard drives not being properly "scrubbed" before the machines were donated to school districts, given to other state agencies or sold to the public...

More (SignOnSanDiego.com)

e-Cops playing catch-up in Oz

Wednesday, May 25, 2005 (06:00:09)
Australia's electronic crime investigators are at risk of being outrun by new technology, one of the country's senior computer forensic technicians has revealed. Australian Federal Police (AFP) Electronic Evidence Forensic and Technical co-ordinator Paul Reedy said police investigators would have to spend their training budgets wisely in order to keep pace as with technological changes. "The rate at which systems we encounter is changing is so rapidly that it's difficult to stay across all of it. We've been looking at alternative ways of doing it in terms of resources and training. I'm satisfied with the level that we are at but we've got to target our training very carefully," Mr Reedy said.

(Australian IT)

New Article: The Essentials Of Computer Discovery

Tuesday, May 24, 2005 (12:23:52)
A new article by Joan E. Feldman of Computer Forensics Inc. entitled "The Essentials Of Computer Discovery" is now online.

The article can be read here.

eBay cybercrime chief tells UK to wise-up

Tuesday, May 24, 2005 (09:47:11)
Howard Schmidt, the former cybersecurity adviser to the White House, has warned that there aren't enough trained police officers in the world to tackle cybercrime effectively. Schmidt, now the chief security strategist at auction site eBay, told delegates at the e-Crime Congress in London last month that the issue needs to be addressed as high-tech law-breaking becomes more widespread. "One thing that is very prevalent is that there aren't enough investigators to handle all the cases coming through," Schmidt said...

More (silicon.com)

New Article: Description of the FAT fsstat Output

Monday, May 23, 2005 (08:10:47)
A new article from The Sleuth Kit Informer by Brian Carrier entitled "Description of the FAT fsstat Output" is now online.

The article can be read here.

An elite force takes on the dark side of computing

Friday, May 20, 2005 (13:05:39)
In an unmarked building in downtown Washington, Brian K. Nagel and 15 other Secret Service agents manned a high-tech command center, poised for the largest-ever roundup of a cybercrime gang. A huge map of the U.S., spread across 12 digital screens, gave them a view of their prey, from Arizona to New Jersey. It was Tuesday, Oct. 26, 2004, and Operation Firewall was about to be unleashed...

More (BusinessWeek online)

New Article: The Mobile Forensic Platform

Thursday, May 19, 2005 (12:57:27)
A couple of years ago, the IJDE published an article by Frank Adelstein entitled "MFP: The Mobile Forensic Platform". With the kind permission of both Frank and the IJDE I'm delighted to reproduce the article at Forensic Focus and it can now be read here.

Since then the MFP has grown and become a commercial product called the Online Digital
Forensic Suite. Frank has offered to put together a new article with details of how the MFP has changed and what is offered in the new package. We look forward to it and will publish the new article here as soon as it becomes available.