±Forensic Focus Partners

Become an advertising partner

±Your Account


Forgotten password/username?

Site Members:

New Today: 2 Overall: 32225
New Yesterday: 3 Visitors: 113

±Follow Forensic Focus

Forensic Focus Facebook PageForensic Focus on TwitterForensic Focus LinkedIn GroupForensic Focus YouTube Channel

RSS feeds: News Forums Articles

±Latest Articles

RSS Feed Widget

±Latest Webinars

Page 242

Search on This Topic: News

[ Go to Home | Select a New Topic ]

Forensic experts may testify that CA executives erased data

Tuesday, February 21, 2006 (12:50:29)
Former CA chairman and chief executive Sanjay Kumar and another CA executive obstructed justice by attempting to erase evidence from computers after the federal government began investigating accounting fraud at the software company, prosecutors say in a letter to defense attorneys...

More (Newsday.com)
  • Posted by: jamie
  • Topic: News
  • Score: 0 / 5
  • (750 reads)

Without a trace: Documents and deleted data

Monday, February 20, 2006 (16:07:08)
Documents tend to collect hidden data, which takes two forms. One is metadata, or data about a document, which is appended by the program, often unnoticed by the user. Then there’s data that was part of the original document but somehow has been rendered invisible to the average user. Knowing how to find both types of hidden data is critical to getting rid of it...

More (GCN)
  • Posted by: jamie
  • Topic: News
  • Score: 0 / 5
  • (711 reads)

Guidance - The Next Generation of Write Block Technologies

Sunday, February 19, 2006 (14:19:07)
On February 22nd, Guidance Software will host an online seminar that will explore the next generation of write block technologies. One of the first rules taught in computer investigations is to assure that the original media is not altered, and that the methods used to create forensic quality copies of the media and static data assure that the integrity of the original is maintained. For this reason, the use of write blocking / prevention mechanisms has always been suggested for "media imaging," as well as thorough testing beforehand to assure that the mechanism works without fail...

  • Posted by: jamie
  • Topic: News
  • Score: 0 / 5
  • (3883 reads)

Anonymity on a Disc

Sunday, February 19, 2006 (14:12:24)
To many privacy geeks, it's the holy grail -- a totally anonymous and secure computer so easy to use you can hand it to your grandmother and send her off on her own to the local Starbucks. That was the guiding principle for the members of kaos.theory security research when they set out to put a secure crypto-heavy operating systems on a bootable CD: a disc that would offer the masses the same level of privacy available to security professionals, but with an easy user interface...

More (Wired)
  • Posted by: jamie
  • Topic: News
  • Score: 0 / 5
  • (1555 reads)

Today's FBI: Computer forensics, digital fingerprints

Friday, February 17, 2006 (12:17:03)
When you think of crime scenes and gathering evidence, perhaps DNA and fingerprints come to mind. But there's another science which is helping law enforcement agencies like HPD find and convict criminals. It is the growing field of forensic computing. In a Houston office building, FBI-trained computer forensic examiners work at what's called the Regional Computer Forensics Laboratory...

More (khou.com)

Judge: OK To Look For Evidence In City Databases

Thursday, February 16, 2006 (11:57:50)
A Becker County District Court judge has said an independent computer forensics expert can look for evidence in Moorhead, Minn. (US) city databases that police officers have to fulfill monthly quotas for traffic citations...

More (wcco.com)
  • Posted by: jamie
  • Topic: News
  • Score: 0 / 5
  • (553 reads)

Sebek 3: tracking the attackers, part two

Wednesday, February 15, 2006 (12:20:39)
In part one of this series, we discussed the current Sebek development and its integration with GenIII Honeynets. In this article, we take it a step further and focus on best practices to deploy Sebek inside a GenIII Honeynet, as well as the new Sebek "write" patch...

More (Security Focus)
  • Posted by: jamie
  • Topic: News
  • Score: 5 / 5
  • (638 reads)

Red Cliff Consulting LLC Rebrands as MANDIANT

Wednesday, February 15, 2006 (11:39:15)
The information security firm Red Cliff Consulting LLC has renamed itself MANDIANT, reflecting a major evolution in the company's mission over the past year - a year that saw 150% revenue growth, the development of free software tools, and the rapid expansion of its advanced security services and customized education programs...

More (press release)
  • Posted by: jamie
  • Topic: News
  • Score: 0 / 5
  • (3414 reads)

Computer records play large role in gathering evidence

Tuesday, February 14, 2006 (11:37:15)
Investigators are relying on computer records to trace Neil Entwistle’s steps in the days before he allegedly shot his wife, Rachel, and 9-month-old daughter, Lillian Rose. As computers play an ever-greater role in everyday life, they are becoming increasingly important sources of evidence for police and prosecutors, investigators say...

More (MilfordDailyNews.com)
  • Posted by: jamie
  • Topic: News
  • Score: 0 / 5
  • (713 reads)

China Computer Forensics Conference, 17-18 June 2006

Monday, February 13, 2006 (20:26:13)
Sprite Guo, a policeman in China, has contacted me with details of the China Computer Forensics Conference 2006 (CCFC 2006), a computer forensics conference that takes place between members of the law enforcement community and computer forensic companies in China. This year the focus is on data recovery and forensic analysis techniques. He would like to invite computer forensic training agencies who want to enter the Chinese market to attend the conference and prepare some training sessions. Sprite is also keen to attract skilled investigators to the conference and asks anyone interested to visit the web site at http://www.china-forensic.com/2006-en.htm
  • Posted by: jamie
  • Topic: News
  • Score: 0 / 5
  • (2574 reads)