±Forensic Focus Partners

Become an advertising partner

±Your Account


Username
Password

Forgotten password/username?

Site Members:

New Today: 0 Overall: 30676
New Yesterday: 6 Visitors: 94

±Latest Articles

RSS Feed Widget

±Follow Forensic Focus

Forensic Focus Facebook PageForensic Focus on TwitterForensic Focus LinkedIn GroupForensic Focus YouTube Channel

RSS feeds: News   Forums   Articles

Page 242

Search on This Topic: News

[ Go to Home | Select a New Topic ]

Fletcher aides leave plentiful trail of e-mail

Monday, June 06, 2005 (04:24:14)
Comfortable with high-tech gadgets, Gov. Ernie Fletcher's aides use state-issued computers and BlackBerries to send e-mail that details their deeds, plans, turf battles, even their moods, sometimes on an hourly basis. Now, that e-mail is a trail of bread crumbs for prosecutors to follow as they investigate what role is played by Republican politics in the Fletcher administration's merit-system hiring...

More (Lexington Herald-Leader)

The Certified Computer Examiner Certification

Saturday, June 04, 2005 (05:38:42)
While computer forensics certifications are not as mainstream as an MCSE or CCNA, there are several forensic certifications that are growing in prominence and that are worthy of investigation if you are considering this type of certification. One of these is the Certified Computer Examiner (CCE)...

http://www.certified-computer-examiner.com/

Sault College (ON, Canada) to host computer forensics workshop

Friday, June 03, 2005 (04:58:17)
Sault College (Marie, ON, Canada) will present a computer forensics workshop for IT professionals from June 13 to 17. James Lewis, site director for the Centre for Systems Security and Information Assurance (CSSIA) at Washtenaw Community College in Ann Arbor, will lead the training program, which will be delivered through daylong sessions at the college...

More (LTVNEWS.COM)

Sault College web site

Keyboard cops

Thursday, June 02, 2005 (05:57:12)
Forget leaving fingerprints at the scene of the crime. Today's police know that the hard evidence they find on your hard drive can put you behind bars. Computer forensic analysts - the detectives of the digital world - are in big demand. Electronic evidence is proving critical in solving crimes, with the proliferation of computers, PDAs, mobile phones and even iPods...

More (Independent)

CFP: DFRWS -- Extended Deadline

Wednesday, June 01, 2005 (17:40:33)
From Brian Carrier:

The paper submission deadline for DFRWS 2005 has been extended until
Friday June 3, 2005. For those who have already submitted papers, you can
still edit your submission on the server. For those who requested an
extension or are behind because of the long weekend, you have a few more
days to finish your papers. For those who are hearing about the Digital
Forensic Research Workshop for the first time, you can refer to the Call
For Papers and consider submitting a paper or panel proposal.

http://www.dfrws.org/2005/

An Inside Look at a Disk Recovery Service

Wednesday, June 01, 2005 (14:10:06)
In many failure-related cases, the chances of recovering data from a hard disk range from good to very good. If the electronic system is the only thing affected, then the drive can often be reused after the control panel has been replaced. If, on the other hand, the defect is of a mechanical nature, then recovery will be a bit more difficult. So long as the drive components can be replaced, expenses can be kept to a minimum. However, if special equipment is required, then the bill will quickly run up into the range of four figures...

More (Tom's Hardware Guide)

Used hard drives betray company secrets

Wednesday, June 01, 2005 (05:12:56)
A study of 200 hard drives bought on eBay this year reveals that over 70 per cent contained sensitive personal or business data. German data recovery firm O&O Software was able to recover 3.3 million files, including 40,000 Word documents, 15,000 Excel spreadsheets and about 50 complete email inboxes. In one case a large German bank left details of customer credit ratings in files which O&O said were only protected by being labelled 'Highly Confidential'. The report also mentions finding what it calls 'onion drives'. These are drives that have been formatted by users and still left with data written onto the hard drive...

More (computing)

New Article: Developing A Framework For Evaluating Computer Forensic Tools

Monday, May 30, 2005 (14:00:41)
A paper by Colin Armstrong (of Curtin University of Technology in Australia) entitled "Developing A Framework For Evaluating Computer Forensic Tools" is now available online.

The paper can be read here.

A list of other articles and papers available at Forensic Focus can be found here, new submissions are always welcome.

EnCase Device Configuration Overlay Data Acquisition Weakness

Monday, May 30, 2005 (07:41:17)
Arne Vidström has reported a weakness in EnCase, which can be exploited to hide information on a disk. The weakness is caused due to missing support of Device Configuration Overlays (DCO) and therefore causes the program to not acquire parts of a disk using this feature. The weakness has been reported in EnCase Forensic Edition 4.18a. Other versions may also be affected...

More (Secunia)

New Paper: The Forensic Chain of Evidence Model

Friday, May 27, 2005 (18:19:57)
A paper by Atif Ahmad entitled "The Forensic Chain of Evidence Model - Improving the Process of Evidence Collection in Incident Handling Procedures" is now available online.

The paper can be read here.

A full list of papers and articles at Forensic Focus can be found here. New submissions are always welcome.