±Forensic Focus Partners

Become an advertising partner

±Your Account


Username
Password

Forgotten password/username?

Site Members:

New Today: 0 Overall: 31971
New Yesterday: 9 Visitors: 101

±Follow Forensic Focus

Forensic Focus Facebook PageForensic Focus on TwitterForensic Focus LinkedIn GroupForensic Focus YouTube Channel

RSS feeds: News Forums Articles

±Latest Articles

RSS Feed Widget

±Latest Webinars

Page 242

Search on This Topic: News

[ Go to Home | Select a New Topic ]

New paper: Analysis of hidden data in the NTFS file system

Monday, January 16, 2006 (02:04:51)
A new paper entitled "Analysis of hidden data in the NTFS file system" by Cheong Kai Wee of Edith Cowan University is now online.

A full list of articles and papers held at Forensic Focus can be found here.

Defense lab accredited in computer forensics

Sunday, January 15, 2006 (16:19:59)
After years of work, the Defense Computer Forensics Laboratory—part of the DOD Cyber Crime Center (DC3)—has been accredited by the American Society of Crime Laboratory Directors/Laboratory Accreditation Board. Ralph Keaton, executive director of ASCLD/LAB, presented the certificate of accreditation to representatives of DCFL Jan. 10 during the first day of the DOD Cyber Crime Conference...

More (GCN)

Gov't Cyber-sleuths Focusing on Linux, iPod, Xbox

Friday, January 13, 2006 (14:42:21)
Cyber-security and computer experts from the government and law enforcement are increasingly concerned with malicious code that runs on Linux and Apple Computer Inc.'s Mac OS X operating systems and threats posed by devices such as iPods and Xboxes. Intensive courses on the Mac OS X and Linux operating systems, as well as iPods, were just a few of the offerings at a recent cyber-security conference sponsored by the U.S. Department of Defense. Network administrators and cyber-investigators say they are increasingly being called on to investigate compromises of non-Windows operating systems and to analyze portable devices such as iPods, according to interviews with attendees by eWEEK...

More (eWEEK.com)
  • Posted by: jamie
  • Topic: News
  • Score: 0 / 5
  • (829 reads)

FTC launches site to fight cybercrime

Thursday, January 12, 2006 (09:34:11)
Responding to the rising cybercrime threat, the Federal Trade Commission on Tuesday unveiled an online tool designed to help consumers avoid becoming victims of Internet scams. At the website, www.onguardonline.gov, consumers can take interactive quizzes designed to enlighten them about ID theft, phishing, spam and online-shopping scams...

More (USA Today)
  • Posted by: jamie
  • Topic: News
  • Score: 0 / 5
  • (575 reads)

2005 FBI Computer Crime Survey

Wednesday, January 11, 2006 (14:35:06)
Despite investing in a variety of security technologies, enterprises continue to suffer network attacks at the hands of malware writers and inside operatives, according to an annual FBI report released today. Many security incidents continue to go unreported. The 2005 FBI Computer Crime Survey was taken by 2,066 organizations in Iowa, Nebraska, New York, and Texas late last spring, which survey organizers deemed a good sample of enterprises nationwide...

More (SearchSecurity)
  • Posted by: jamie
  • Topic: News
  • Score: 0 / 5
  • (979 reads)

West Yorkshire BCS Meeting - January 2006

Wednesday, January 11, 2006 (03:05:10)
"Computer Forensics"

Tuesday 24 January 2006, 5:45 pm (refreshments) for a 6:30 pm start
Speaker: Russell May BSc(Hons) CITP CEng MBCS EnCE
[Guidance Software Inc]
Venue: Met Hotel, Leeds.

Technology Pathways Receives Top Pick Award from ITDefense Magazine

Monday, January 09, 2006 (12:59:13)
Technology Pathways, LLC announced today that it has received a Top Pick award from ITDefense Magazine in their January 2006 buyer’s guide edition. ProDiscover was selected as a Top Pick over other computer forensic solutions for its performance and value. Priced at under $10,000, it provides affordable remotely enabled computer forensics capability which allows IT Security specialists to forensically examine a computer system within their network while the machine is live and running. This allows for investigations and incident response processes to take place with minimal disruption to work flow and avoids costly downtime. For internal employee investigations, ProDiscover can operate in a “stealth” mode to minimize the possibility of detection by the employee under investigation, even if they are currently using their computer...
  • Posted by: jamie
  • Topic: News
  • Score: 0 / 5
  • (642 reads)

Cybercrime gives experts virtual headache

Friday, January 06, 2006 (15:48:23)
With an increasing amount of business being done online, the chances are growing that you, or your company, may become a victim of online criminal activity. If cybercrime strikes you, who ya gonna call?

More (Business Edge News Magazine)
  • Posted by: jamie
  • Topic: News
  • Score: 0 / 5
  • (685 reads)

N.J. forms cyber-crime task force

Thursday, January 05, 2006 (15:48:16)
Victims of computer crime now have a powerful ally in the State of New Jersey. The Attorney General's Office announced yesterday that a Computer Crime Task Force had been formed by merging the nationally known state police cyber-crimes unit with the office's computer analysis and technology unit...

More (Philadelphia Inquirer)
  • Posted by: jamie
  • Topic: News
  • Score: 0 / 5
  • (511 reads)

Cybercrime in France: An Overview

Wednesday, January 04, 2006 (14:38:05)
Though there can be many factors which affect the rise of cybercrime, some major environmental characteristics of Internet in France which affect the most are firstly, the number of Internet users is increasing rapidly...

More (Computer Crime Research Center)