±Forensic Focus Partners

Become an advertising partner

±Your Account


Username
Password

Forgotten password/username?

Site Members:

New Today: 0 Overall: 32461
New Yesterday: 4 Visitors: 131

±Follow Forensic Focus

Forensic Focus Facebook PageForensic Focus on TwitterForensic Focus LinkedIn GroupForensic Focus YouTube Channel

RSS feeds: News Forums Articles

±Latest Articles

RSS Feed Widget

±Latest Webinars

Page 286

Learn to retrieve data in Modesto CA

Friday, January 21, 2005 (07:17:27)
Kirk Stockham, a retired computer forensics investigator, will show members of the Modesto PC Users Group how to find hidden data on a hard drive. He will also explain how to recover data that may have been accidentally erased and talk about identity theft. The presentation will be at 7:30 p.m. Jan. 27 at Destiny Christian Center, 1161 Carver Road. At 6:30 p.m., the club will host a question and answer period. The public is welcome.

More (modbee.com)

High-tech sleuths set up shop in Manhattan

Thursday, January 20, 2005 (07:27:21)
A Gresham-based computer forensics consulting group has launched a cross-country expansion, opening an office in Manhattan last month. NTI Breakwater, a division of Seattle-based Breakwater Security Associates, hopes to keep a central laboratory in the Portland area while opening offices in key corporate and legal markets such as Chicago, Los Angeles and Atlanta.

More (OregonLive.com)

"Forensic Discovery" by Dan Farmer and Wietse Venema

Wednesday, January 19, 2005 (09:10:11)
Just a quick note to let everyone know that a new book, "Forensic Discovery", by Dan Farmer and Wietse Venema is now available from Amazon.com (ISBN 020163497X). For some reason it appears to be listed under the title "Internet Security" at Amazon.co.uk, not sure if that's a mistake or not...

NZ computer expert aids US murder case

Tuesday, January 18, 2005 (13:13:35)
A New Zealand computer forensics expert is helping American investigators gather evidence against the woman accused of murdering a pregnant Missouri woman and kidnapping her unborn child. Daniel Ayers, of McCallum Petterson in Auckland, was approached by an FBI-sponsored forensic laboratory in Kansas City to help unravel key evidence in the case against Lisa Montgomery.

More (The New Zealand Herald)

DOD cyber sleuths swap secrets in Florida

Friday, January 14, 2005 (12:20:04)
The U.S. Department of Defense (DOD) is making changes to streamline its response to online threats across the various branches of the military, and deal with a steady stream of new online woes, from hacking attempts to child pornography and threats posed by powerful portable storage devices such as iPods, according to senior DOD officials. The DOD blocked and traced 60,000 intrusion attempts on its unclassified networks in 2004, and wrestles with spam, illicit pornography and other common Internet threats. If left to fester the threats could hamper the massive defense agency, which relies on global, unclassified networks for critical business operations, said Lieutenant General Harry Raduege, director of the Defense Information Systems Agency.

Raduege was speaking at the Department of Defense Cyber Crime Conference in Palm Harbor, Florida, an annual gathering of some of the government's top IT, computer forensic and research and development talent.

More (Standard)

Hard drives, hard facts

Monday, January 10, 2005 (09:16:36)
In Montgomery County's (US) computer forensic department, Det. Ray Kuter's workload has grown steadily during the past four years. Kuter heads the forensic laboratory. Computer forensic analysis has come of age in recent years and is now routinely performed to gather evidence on suspects in all types of criminal cases. In the past two years, Kuter's forensic exams showed a defendant had used instant messaging to intimidate a witness set to testify in her trial, uncovered another woman's fraudulent online purchases of prescription drugs, and revealed some online habits of a man convicted of murdering an East Norriton woman...

More (The Times Herald)

Digital lifesaver

Monday, January 10, 2005 (09:12:27)
Problems encountered in daily life often spawn new business concepts. But few problems are as severe as those encountered by Brady Essman, the 36-year- old president, CEO and founder of digitalmedix, an Englewood-based data retrieval and computer forensics firm. Essman's story began with a crashed hard drive that resulted in critical sales information being lost. Essman subsequently lost his job with a storage technology company. A divorce followed. And while there may not be a direct line between a dead hard drive and a wrecked marriage, Essman's world came crashing down in the spring of 1998.

More (RockyMountainNews.com)

FBI Opens New Bay Area Forensics Lab

Saturday, January 08, 2005 (17:02:18)
They are the types of evidence now linking virtually every case the FBI investigates -- high-tech devices used by criminals. Now the FBI is sharing its high-tech tools with Bay Area law enforcement by opening a new forensics lab.

More (abc)

Begin a forensics investigation with WinHex

Thursday, January 06, 2005 (11:39:24)
The time may come when you need to examine a hard drive either because you need to recover some lost data or because you suspect an employee of a violation. Whether you intend to use your findings in court, for employee discipline, or just for your own information, using a good forensics tool and recognized forensics techniques will help you both recover your data and preserve its value as evidence. A tool I recommend is WinHex...

More (TechRepublic)

Cyber crime booms in 2004

Wednesday, December 29, 2004 (13:52:49)
The last 12 months have seen a dramatic growth in almost every security threat that plague Windows PCs. The count of known viruses broke the 100,000 barrier and the number of new viruses grew by more than 50%. Similarly phishing attempts, in which conmen try to trick people into handing over confidential data, are recording growth rates of more than 30% and attacks are becoming increasingly sophisticated. Also on the increase are the number of networks of remotely controlled computers, called bot nets, used by malicious hackers and conmen to carry out many different cyber crimes.

More (BBC)