±Forensic Focus Partners

Become an advertising partner

±Your Account


Username
Password

Forgotten password/username?

Site Members:

New Today: 0 Overall: 34081
New Yesterday: 1 Visitors: 109

±Follow Forensic Focus

Forensic Focus Facebook PageForensic Focus on TwitterForensic Focus LinkedIn GroupForensic Focus YouTube Channel

RSS feeds: News Forums Articles

±Latest Articles

RSS Feed Widget

±Latest Webinars

Page 284

Digital Forensic Readiness: Are You In?

Thursday, December 22, 2005 (15:41:16)
As we approach a pervasive computing society, are you prepared for the challenge of using digital forensics to reconstruct a compromise?

More (EIT)

Computer forensics tools maker hacked

Wednesday, December 21, 2005 (15:29:17)
Guidance Software had to do a forensic investigation on its own systems after a hacker broke in and accessed records, including credit card data, of thousands of customers. The attack occurred in November, but wasn't discovered until Dec. 7, John Colbert, chief executive officer of Guidance, said in an interview Monday. The attack exposed data on thousands of the company's customers, including 3,800 whose names, addresses and credit card details were exposed, he said...

More (News.com)
  • Posted by: jamie
  • Topic: News
  • Score: 0 / 5
  • (659 reads)

What is the Scope of Computer Forensics?

Monday, December 19, 2005 (18:10:08)
Jety asks: "I do general-purpose tech support for a variety of individuals and small businesses. Today, one of my clients presented me with an interesting situation, which made me recommend that he get his own attorneys and computer forensics experts on the job. Above and beyond that, to satisfy my own curiosity and to have some insight to offer him in the meantime - I have some question about the scope of what computer forensics can accomplish, for this I turn to the experts of Slashdot, which can be boiled down to one issue: What exactly can a good computer forensics guy pull off of a hard drive - particularly once it's gone on to be used for a full week after the incident in question?"

More (Slashdot)
  • Posted by: jamie
  • Topic: News
  • Score: 0 / 5
  • (1015 reads)

How to Keep a Digital Chain of Custody

Sunday, December 18, 2005 (04:43:35)
Christine has very kindly mailed me with the following useful link:

How to Keep a Digital Chain of Custody
http://www.csoonline.com/read/120105/ht_custody.html

Matching photographs to a camera's "fingerprint"

Thursday, December 15, 2005 (17:09:13)
Because almost all digital photos, including those used as evidence in court, are vulnerable to tampering, computer scientists and others are busy advancing the state of the art in digital forensics...

More (Technology Review)

Officers get cyber training

Wednesday, December 14, 2005 (20:37:22)
The world has benefited in many ways from the information technology boom of the last 50 years, but the advancements have given crooks and predators yet another way to victimize. That means criminal investigations must evolve as well. Nowhere has that been proven more true than in the Eden Police Department...

More (Eden Daily News)

Manchester based CY4OR take on the nation’s cyber criminals

Monday, December 12, 2005 (19:22:13)
Business is booming for Computer Forensic Company CY4OR as they expand to meet with the weighty national demand to investigate computer crime. The company is the brain child of computer enthusiast Joel Tobias whose intuitive anticipation of the growth in this market has led to the team tripling in size since its creation in 2002. “Computer Crime is a growing problem that needs to be addressed by UK companies of all sizes” says Tobias “A staggering 89% of businesses have experienced an incident of computer related crime in the past year, with the majority of these being committed internally by disgruntled or dishonest staff.”

Steganalysis plug-in for Inforenz Forager computer forensics software

Monday, December 12, 2005 (12:56:09)
With its latest version of Forager® 1.3, Inforenz tackles the rising issue of information leakage by releasing a plug-in for its forensic software that identifies where data is concealed in other files. It enables computer forensic investigators to search for both the presence of known steganographic tools as well as suspect files which may hold concealed information.

Google Searches Help Convict Suspect

Wednesday, December 07, 2005 (18:08:13)
A North Carolina jury has found a man guilty based on evidence which included Google searches for the terms "neck," "snap," "break," and "hold". The man has been sentenced to life without parole, but plans to appeal the decision...

More (Smarthouse)

Document metadata

Tuesday, December 06, 2005 (14:48:11)
Few things in the world of digital documents are as pesky and revealing as "metadata" -- the information automatically embedded in documents by popular software such as Microsoft Word or Adobe Acrobat. When the government or a business forgets to purge metadata from documents before releasing them to the public, the results can range from embarrassing to dangerous...

More (Washington Post)