±Forensic Focus Partners

Become an advertising partner

±Your Account


Forgotten password/username?

Site Members:

New Today: 2 Overall: 32600
New Yesterday: 3 Visitors: 160

±Follow Forensic Focus

Forensic Focus Facebook PageForensic Focus on TwitterForensic Focus LinkedIn GroupForensic Focus YouTube Channel

RSS feeds: News Forums Articles

±Latest Articles

RSS Feed Widget

±Latest Webinars

Page 241

Search on This Topic: News

[ Go to Home | Select a New Topic ]

Cop leads crackdown on internet fraudsters

Monday, May 22, 2006 (14:52:10)
An Internet supercop has been appointed to track down online fraudsters. Detective Constable Scott Rennie will spearhead investigations into crooks using auction website eBay. The move by Strathclyde Police comes as internet crime in the UK has soared to a new high. Bosses at eBay have become so concerned that they are helping train cops to track down the criminals...

More (Daily Record)

Meet The Hackers

Friday, May 19, 2006 (16:09:44)
Cybercrooks are stealing billions. An inside look at law enforcement's biggest targets...

More (BusinessWeek)

Perlustro Selects EnterpriseDB for Computer Forensics Suite

Thursday, May 18, 2006 (15:31:49)
EnterpriseDB has announced that Perlustro will integrate EnterpriseDB Advanced Server into its ILook Investigator Forensic Software (ILook), a comprehensive suite of computer forensics tools used to acquire and analyze digital media. ILook's development is supported by the IRS Criminal Investigation Division, and it is provided free to federal, state, and local law enforcement, the military, and intelligence agencies, where it is used for all types of digital investigations. For more information, visit www.ILook-forensics.org.

Hidden Messages

Wednesday, May 17, 2006 (20:25:03)
"Imagine that someone has stabbed Pamela Mills-Senn in her apartment," says Currie, OIC of the technological crime branch of the Royal Canadian Mounted Police (RCMP). "One of her neighbors has come over and found her dead and calls the police. You might think, 'this has nothing to do with computers'. Wrong. You can tell by the computer when Pamela was last on it; who she talked to, what chatrooms she visited, what messages she posted, what Web sites she looked at...

More (officer.com)

Judges And Prosecutors Throw The Book At Hackers

Tuesday, May 16, 2006 (15:17:40)
Eric McCarty goes before a federal judge this month on charges he damaged the University of Southern California's online application system. McCarty, 25, says he was just trying to highlight the Web site's security vulnerabilities. A not-guilty plea just might fly with a jury, since it doesn't appear McCarty did anything with the data he stole. But as data theft and other cybercrimes wreak damages nationwide, the "white-hat hacker" defense won't win him much sympathy. Meanwhile, prosecutors and judges are treating these cases much more seriously...

More (InformationWeek)
  • Posted by: jamie
  • Topic: News
  • Score: 0 / 5
  • (2270 reads)

Microsoft's BitLocker

Tuesday, May 16, 2006 (04:03:30)
BitLocker Drive Encryption is a new security feature in Windows Vista, designed to work with the Trusted Platform Module (TPM). Basically, it encrypts the C drive with a computer-generated key. In its basic mode, an attacker can still access the data on the drive by guessing the user's password, but would not be able to get at the drive by booting the disk up using another operating system, or removing the drive and attaching it to another computer...

Open Computer Forensics Architecture (ocfa)

Monday, May 15, 2006 (12:24:49)
The Open Computer Forensics Architecture (OCFA) is a modular computer forensics framework build by the "Dutch National Police Agency". The main goal is to automate the digital forensic process to speed up the investigation and give tactical investigators direct access to the seized data through an easy to use search and browse interface...

Digital Forensic Research Workshop Challenge 2006

Saturday, May 13, 2006 (15:18:28)
From Brian Carrier:

Based on the success of the Digital Forensic Research Workshop (DFRWS)
2005 memory analysis challenge, a new challenge is being posted for DFRWS
2006. This year, the focus is on file carving techniques.

The challenge data set contains JPEG, ZIP, Office, HTML, and text files
and fragments. The goal is to develop new tools and techniques to extract
as many files as possible while reducing the number of false positives.
All techniques developed for this challenge must be fully described and
source code for tools must be released (after all, the goal of DFRWS is to
foster research...).

More details can be found at:

Submissions are due by July 17, 2006 and results will be announced at the
DFRWS 2006 reception.

New versions of TSK and Autopsy now available

Friday, May 12, 2006 (15:26:52)
Received from Brian Carrier:

New versions of TSK and Autopsy are now available (after the longest
duration of no releases in the history of the tools). There are several
new features including Expert Witness (EnCase) images, AFF images, and ISO
9660 file systems, which were primarily developed by people other than
myself (see below). There are also new features that are listed below.


Call for comments on Angolan computer crime Bills

Friday, May 12, 2006 (15:14:29)
The National Information Technology Commission (CNTI) has appealed to experts of the sector for greater participation in proposed legislation on computerised crime, protection of data and information security, according to the Angola Press Agency. CNTI's media spokesperson, Luísa dos Santos, said the documents should have been discussed in March, but because of the lack of comments it was postponed...

More (LegalBrief Africa)