±Forensic Focus Partners

Become an advertising partner

±Your Account


Username
Password

Forgotten password/username?

Site Members:

New Today: 0 Overall: 30775
New Yesterday: 0 Visitors: 52

±Latest Articles

RSS Feed Widget

±Follow Forensic Focus

Forensic Focus Facebook PageForensic Focus on TwitterForensic Focus LinkedIn GroupForensic Focus YouTube Channel

RSS feeds: News   Forums   Articles

Page 242

Search on This Topic: News

[ Go to Home | Select a New Topic ]

Computer Forensics Explained: A Primer for Physical Security Professionals

Wednesday, July 13, 2005 (09:58:29)
This article introduces computer risk and more specifically computer incident response and forensics to an audience who is traditionally accustomed to implementing physical controls such as camera surveillance, physical access, and alarm systems throughout their facility. We'll look at the methodology used during a computer incident, as well as the steps taken during a computer forensics investigation subsequent to an incident. Finally, a real case study will be introduced to fortify the points and demonstrate incident response in practice...

More (SecurityInfoWatch.com)
  • Posted by: jamie
  • Topic: News
  • Score: 0 / 5
  • (313 reads)

Version 2.02 of The Sleuth Kit now available

Monday, July 11, 2005 (10:49:33)
Bug Fixes
- fls could crash if FAT short name did not exist
- Linux header file problem with some distros.
- Missing UFS / Ext2/3 file names (if deleted file claimed it used that data).
- Missing FAT directory entries with ils (if initial entries in cluster were invalid).
- Missing NTFS file if no $DATA or $IDX_* attributes existed (which meant the file had no content).

Updates
- Support for OS X Tiger.
- Internal design improvements and memory leak fix.
- 'ils -o' was readded as 'ils -O'.
- 'mactime -m' was added so that month is printed as number instead of name.

MD5: d8f53a69069369ee20a4ce623eb640b5

http://www.sleuthkit.org/sleuthkit/
  • Posted by: jamie
  • Topic: News
  • Score: 0 / 5
  • (254 reads)

UK computer forensics firm plays key role in investigation

Friday, July 08, 2005 (08:06:32)
A computer forensics firm from Sawbridgeworth has played a key role in a criminal investigation. Crucial evidence from company DataSec led to the convictions of Terry Butler and David Weightman, whose computer equipment contained tens of thousands of CP images. The specialist business was employed by Essex Police to examine computers and disks seized at their addresses in South Woodham Ferrers and Peckham.

New High Tech Crime Lab Opens in Salt Lake City, US

Thursday, July 07, 2005 (09:10:03)
A new high-tech crime lab (one of the FBI's Regional Computer Forensics Labs) opened yesterday in Salt Lake City, Utah, USA...

More (KSL News)

PCMCIA write-blocking pod from Vogon announced

Thursday, July 07, 2005 (09:06:35)
Vogon International has launched a ‘PCMCIA write-blocking pod’ as an addition to its investigation hardware product portfolio. Developed in Vogon's laboratories, this is claimed to be the only commercially available product of its kind, and aimed at forensic investigators involved in examining electronic equipment.

More (press release)

Apple's iPod a useful tool for criminals

Tuesday, July 05, 2005 (07:01:50)
"Similar to the way the personal computer became common in the home in the '80s and '90s, the iPod is becoming common today," Dr. Marcus Rogers, a cybercrime expert at Purdue University's Center for Education and Research in Information and Security, in West Lafayette, Ind., wrote in a recent report, "iPod Forensics." This growing popularity, Rogers continued, "has allowed a criminal element to find 'alternative' uses for a seemingly harmless device, and the Apple iPod is finding its way into the criminal's bag of tricks."

More (PhysOrg.com)

De Montfort to train cyber sleuths in UK

Monday, July 04, 2005 (10:26:18)
A British university is to offer a four-year sandwich degree course in computer forensics. Leicester's De Montfort University is hoping to recruit 20 students for the course, which begins in September and is one of only five of its kind in the UK...

More (silicon.com)

Cyber crime leaves police in dust

Friday, July 01, 2005 (04:42:27)
Federal agents are in a familiar position as they probe the computer-security breach at an Arizona firm that left credit-card data for some 40 million people open to theft: Once again, they're playing catch-up. Faced with the vastness of cyberspace, the technical prowess of the thieves and the runaway pace of technology, finding the culprits is no simple matter. ''Unfortunately, the nature of cyber crime and identity theft is such that law enforcement will probably always be involved in a game of catch-up,'' said Paul Luehr, Minneapolis-based vice president for Stroz Friedberg, a national computer forensics and consulting firm...

More (Miami Herald)

Computer evidence the new ‘paper trail’ in crime investigations

Tuesday, June 28, 2005 (05:43:52)
“It’s becoming increasingly common that any time you have a serious criminal investigation, that law enforcement is seeking the seizure of computers as a source of evidence that’s going to contain information,” Dist. Atty. Charles Branson said. “It’s the modern digital paper trail...”

More (LJWorld.com)

Forensic knack needed to bust cybercrimes in India

Monday, June 27, 2005 (13:47:09)
As cybercrimes in BPOs make headlines, computer forensic experts say Indian investigating agencies need to be a step ahead of the criminals in putting together sophisticated tools to discover evidence. Billions of rupees are stolen each year by criminals with credit card crimes topping the list as the digital revolution in India brings to fore newer frauds, said Mr Samir Datt, Director of Computer Forensics and Investigations in Pune-based software firm 'Visionindia.' "Computer forensics is an emerging field that could help victims of computer crimes to discover evidence. It has wide applications in investigation and analysis techniques to acquire potential legal evidence," Mr Datt said...

More (The Hindu Business Line)