±Forensic Focus Partners

Become an advertising partner

±Your Account


Forgotten password/username?

Site Members:

New Today: 0 Overall: 31089
New Yesterday: 1 Visitors: 115

±Latest Articles

RSS Feed Widget

±Follow Forensic Focus

Forensic Focus Facebook PageForensic Focus on TwitterForensic Focus LinkedIn GroupForensic Focus YouTube Channel

RSS feeds: News   Forums   Articles

Page 242

Search on This Topic: News

[ Go to Home | Select a New Topic ]

Alternative browsers pose challenge for cybersleuths

Wednesday, September 07, 2005 (16:17:45)
Internet Explorer hides nothing from police and other investigators who examine PCs to discover which sites the user has visited, according to a class held Wedensday at the annual training meeting of the High Tech Crime Investigation Association. Investigators know the location of the IE browser cache, cookie files and history, and they know how to read those files. Also, popular forensics tools can help out. But that story changes when it comes to alternative Web browsers such as Firefox and Opera, instructor Glenn Lewis said at the well-attended session. These programs use different structures, files and naming conventions for the data that investigators are after. And files are in a different location on the hard drive, which can cause trouble for examiners. Furthermore, forensics software may not support the Web browsers, he said...

More (news.com)
  • Posted by: jamie
  • Topic: News
  • Score: 0 / 5
  • (388 reads)

New South Wales workplace watchdog law 'a formality'

Wednesday, September 07, 2005 (16:15:23)
The use of email and computer facilities in NSW workplaces will be under watch from October when the Workplace Surveillance Act comes into force, but the head of an email security firm says there is nothing to fear. Peter Croft, the managing director of Clearswift, said the act simply meant that there would be an agreed policy about the use of workplace facilities that both the employer and employee understood. "The act simply says says employers must tell staff that their work email is being monitored. At the same time, staff must understand that if they use the web on their work computer, there are systems in place to track and filter where they surf," he said. NSW will be the first Australian state to bring such a law into force. Victoria and Queensland are set to follow...

More (smh.com.au)
  • Posted by: jamie
  • Topic: News
  • Score: 0 / 5
  • (175 reads)

ICTA starts training in computer crimes enforcement for Sri Lanka police

Wednesday, September 07, 2005 (08:51:05)
When draft legislation for computer crimes was submitted to parliament recently, the Ministry of Defence together with the Information and Communication Technology Agency of Sri Lanka (ICTA) took necessary steps to establish a Computer Crimes Unit at the Police Department. “This Unit is establishing computer forensic skills to facilitate the investigation of computer crime,” Jayantha Fernando, legal advisor to ICTA, says...

More (ColomboPage)
  • Posted by: jamie
  • Topic: News
  • Score: 0 / 5
  • (314 reads)

New forensic computing company in the UK - Innovision

Tuesday, September 06, 2005 (20:43:38)
Andy, one of our longest standing members and forum regular, has moved into private practice with the establishment of Innovision, a forensic data investigation service based in the UK.

I asked Andy to sum up the services his firm will be offering and he provided the following:

"We have an established history in the Forensic Computing field, which draws upon over two decades of experience, mainly specialising in criminal investigation, fraud and Paedophilia related offences. We perform data recovery and specialise in data investigation of all types of digital media, maintaining high standards."

The Innovision website can be found at http://www.innovision-forensics.co.uk/home.htm

  • Posted by: jamie
  • Topic: News
  • Score: 0 / 5
  • (619 reads)

Submissions Being Accepted for Timothy Fidel Award

Tuesday, September 06, 2005 (09:08:34)
PASADENA, Calif., Aug. 31 /PRNewswire/ -- Building on the success of the inaugural Timothy Fidel Memorial Award, Guidance Software along with AccessData, today announced the Timothy Fidel Memorial Award Committee. The Committee was created as the decision making body for the award which is given in memoriam of Special Agent Tim Fidel, who was a pioneer and tireless advocate of cyber forensics.

Computer forensic experts to track copied Clio e-mails

Monday, September 05, 2005 (10:07:51)
The [Clio] Board of Education voted unanimously Monday to hire a computer forensics company to investigate e-mail tampering in the district. Board members said they hope the investigation by Southfield-based Center for Computer Forensics reveals who has gained access to the e-mails of Assistant School Superintendent Fletcher Spears and if administrators have made statements via e-mail about parents that could leave school officials legally vulnerable...

More (mlive.com)

Forensics is not just a word for cops

Wednesday, August 31, 2005 (22:08:42)
Last year, two employees of AdvantaCare Health Partners resigned and launched their own start-up. Prior to leaving, they copied patient databases, confidential business plans, and other trade secrets, and used this information to compete with AdvantaCare. Before leaving, they tried to conceal what they had done by deleting copied files. This case, which is common at companies with valued intellectual property (IP), was resolved through computer forensics. With IP theft, or compromised customer privacy data stored electronically, an effective computer forensics examination will identify those responsible...

More (SC Magazine)

Group honors high-tech work on BTK

Friday, August 26, 2005 (07:33:16)
A Wichita police detective who helped solve the BTK murder cases has won an international crime investigation award. Detective Randy Stone, whose computer sleuthing provided a turning point in the hunt for BTK, will be given an award for "forensics investigation case of the year" by the International High Technology Crime Investigation Association next week at its conference in Monterey, Calif. The association is also presenting an award to the Wichita Police Department's computer crimes lab as a whole, and another award to the FBI's regional computer forensic laboratory in Kansas City, Mo., for its work on the BTK case...

More (Kansas.com)

Storm brewing over SHA-1 as further breaks are found

Thursday, August 25, 2005 (21:27:09)
Three Chinese researchers have further refined an attack on the encryption standard frequently used to digitally sign documents, making the attack 64 times faster and leaving cryptographers to debate whether the standard, known as the Secure Hash Algorithm, should be phased out more quickly than planned. The attack, presented last week at the Crypto conference in Santa Barbara, Calif., would allow a forger to create two documents that return the same digital fingerprint, a short sequence of numbers that represent the contents of a much larger document...

More (SecurityFocus)

Computer Forensics and Its Impact on Employment Litigation

Thursday, August 25, 2005 (09:04:36)
Computer forensics is becoming a routine part of many employment cases. To cite a few recent examples handled by our firm: After a key employee suddenly resigned, the employer hired a computer forensics company to search the hard drive of the employee's work computer. The search uncovered in "unallocated space" (the place where files go when they are deleted) a business plan that described in detail how he was planning to compete with the employer once he left, including a detailed section on how the employer's biggest client would become his own...

More (RJ&L LLP)