±Forensic Focus Partners

Become an advertising partner

±Your Account


Username
Password

Forgotten password/username?

Site Members:

New Today: 0 Overall: 34714
New Yesterday: 0 Visitors: 226

±Follow Forensic Focus

Forensic Focus Facebook PageForensic Focus on TwitterForensic Focus LinkedIn GroupForensic Focus YouTube Channel

RSS feeds: News Forums Articles

±Latest Articles

±Latest Webinars

Page 298

Audit trails and computer forensics

Thursday, November 03, 2005 (15:48:01)
If your employer accuses you of hacking into the company’s computing system and perpetrating a fraud, and you happen to be guilty, what is your safest tactic if you want to escape criminal charges? The answer is: Ask them to prove it. One out of three times, even if computer forensics experts are brought in and given unfettered access to all systems, it will be impossible to prove who is guilty of what. The reason is that few computer networks maintain comprehensive audit trails of who did what and when...

More (CSO)
  • Posted by: jamie
  • Topic: News
  • Score: 0 / 5
  • (742 reads)

Unlocking the power of computer crime evidence

Wednesday, November 02, 2005 (17:21:05)
Though computer evidence now appears in many cases, UK law is not clear on how to handle all this data. Neil Barrett discusses the measures being considered - and the effect they'll have on computer crime prosecution...

More (silicon.com)
  • Posted by: jamie
  • Topic: News
  • Score: 0 / 5
  • (748 reads)

IT Security Breach? Don’t just step in CSI Style

Wednesday, November 02, 2005 (04:28:55)
In every company in the UK there is likely to be a PC, and therefore an IT security breach is almost inevitable. These are the findings of the 2005 National High Tech Crime Unit report into the effect of computer crime on businesses. The main concern for said decision makers after a breach had occurred was how to maintain business continuity. However if half of IT staff employed within companies have no formal IT security qualifications, what exactly must you do to stop your business grinding to a halt? Firstly don’t step in guns blazing CSI style – the Channel 5 TV show that is. Although the glossy crime series has brought Computer Forensics to the forefront of public awareness, it does little to reflect the correct and essential procedures that must be put in place once there is suspicion of criminal activity...
  • Posted by: jamie
  • Topic: News
  • Score: 4 / 5
  • (931 reads)

Seminar addresses digital forensics issues

Tuesday, November 01, 2005 (21:08:55)
Dr. Victor Fay-Wolfe, a computer science and statistics professor at the University of Rhode Island, spoke Friday in Pastore Chemical Laboratory concerning the field of digital forensics. Digital forensics, which Fay-Wolfe defined as "the application of forensic science technology to the discovery, collection, and analysis of digital evidence," is a form of forensic investigation that focuses on computers, PDAs, printers, servers and any other electronic devices that can hold information vital to an investigation...

More (The Good 5 Cent Cigar)
  • Posted by: jamie
  • Topic: News
  • Score: 0 / 5
  • (856 reads)

Cyber crime business booming

Tuesday, November 01, 2005 (00:49:57)
Television crime shows such as "CSI" have brought the science of computer forensics to the forefront of public awareness. But just like about everything coveted by Hollywood, there exists a significant gap between art and reality. No one knows that better than real-life computer forensics investigator Angelique Grado, of The Woodlands. Vice president and director of operations of CyberEvidence Inc., Grado is quick to point out that what makes for a good script doesn't always qualify as proper technique...

More (The Villager)
  • Posted by: jamie
  • Topic: News
  • Score: 4 / 5
  • (890 reads)

Version 3.0 EMail Detective released by Hot Pepper Technology, Inc.

Friday, October 28, 2005 (05:59:46)
Hot Pepper Technology, Inc. (http://www.hotpepperinc.com) has announced the release of version 3.0 of its E-Mail Detective - Forensic Software Tool. E-Mail Detective (EMD) provides investigators with a rapid and comprehensive method of retrieving all America Online E-mail messages and photos stored on a user's computer disk. This updated version adds several new features and enhancements to the application. Version 3.0 offers enhanced AOL reporting features for the investigator: built in key phrase search, automatic hash value tagging, quick scan capability and the ability to run the EMD application from a USB jump drive for field investigations.
  • Posted by: jamie
  • Topic: News
  • Score: 0 / 5
  • (909 reads)

Computer forensics making a difference

Thursday, October 27, 2005 (18:39:14)
For the last four years, David Usery, 47, has been a man the public doesn’t see — a pivotal person behind thousands of criminal case investigations from the 9th judicial District Attorney’s Office and New Mexico State Police as well as local law enforcement. Usery is the Information Systems Manager for the DA’s office. He is a computer forensics expert and prepares computer-generated maps, images and animation for courtroom presentations. The evidence Usery gathers from hard drives is damning, “I’ve never had to testify in court, they (defendants) usually plead,” he said...

More (Portales News-Tribune)
  • Posted by: jamie
  • Topic: News
  • Score: 0 / 5
  • (774 reads)

Fighting cybercrime on a shoestring budget

Wednesday, October 26, 2005 (20:21:45)
In cramped, dingy offices near New York’s East River, a couple dozen detectives and analysts hunch over computers, plowing their way through hundreds of criminal cases. This is the home of the New York Police Department Computer Crime Squad. The heart of this or any other computer crimes unit is computer forensics, the conservation, deconstruction and analysis of electronic evidence contained on personal computers, networks and, increasingly, handheld devices such as cell phones and personal digital assistants...

More (GCN)

Digital fingerprint cracks the case

Wednesday, October 26, 2005 (01:01:41)
Last month, when Australian Federal Court Judge Murray Wilcox ruled that Kazaa is illegally authorising copyright infringement, he put Australia on the world map of landmark intellectual property cases - related cases against Kazaa in the US had previously failed. But Wilcox's finding has also put Australia on the map for another reason. Wilcox relied on crucial digital evidence from forensic computer specialists. In a situation where there was no smoking gun, these specialists were able to build a solid case on purely digital evidence...

More (The Age)

Microsoft, Nigeria Join Forces Against Cybercrime

Monday, October 24, 2005 (17:48:05)
Microsoft Latest News about Microsoft is lending its I.T. expertise to the government of Nigeria in a joint effort to combat e-mail fraud and other cybercrimes in the African nation...

More (Top Tech News)