±Forensic Focus Partners

Become an advertising partner

±Your Account


Username
Password

Forgotten password/username?

Site Members:

New Today: 1 Overall: 35750
New Yesterday: 4 Visitors: 143

±Follow Forensic Focus

Forensic Focus Facebook PageForensic Focus on TwitterForensic Focus LinkedIn GroupForensic Focus YouTube Channel

RSS feeds: News Forums Articles

±Latest Articles

±Latest Videos

±Latest Jobs

Page 298

Cyber Crime: The Wild West, Online

Thursday, August 31, 2006 (21:22:17)
Forget about breaking and entering, aggravated assault and armed robbery. Cyber crime is taking over. While most of us use computers to work, shop, play games, book vacations, or do banking transactions, a new breed of criminal uses the same device to perpetrate crimes. Cyber crime, also known as Internet crime, e-crime, hi-tech crime, or computer crime, refers to any type of illegal activity that is done on a computer or is facilitated by one. Let's delve into this universe and find out what kinds of crimes we all risk falling victim to via our computers...

More (AskMen.com)
  • Posted by: jamie
  • Topic: News
  • Score: 0 / 5
  • (594 reads)

CyberSpeak August 27, 2006

Wednesday, August 30, 2006 (16:43:52)
Two Former Federal Agents Talk About Computer Forensics, Network Security and Computer Crime...

"Back from vacation. This week we talk with Special Agent David Farquhar from the Federal Bureau of Investigations about his recent successful botnet case in Seattle Washington. We also talk about the Motorola Q, DefCon, speedtest.net, thinkfree.com, and listener email."

Podcast
  • Posted by: jamie
  • Topic: News
  • Score: 0 / 5
  • (725 reads)

KoreLogic Wins Digital Forensic Research Workshop Contest

Wednesday, August 30, 2006 (15:11:44)
Klayton Monroe and Jay Smith of KoreLogic Security were key members of the team announced as winners of the 2006 File Carving Challenge at the 6th Annual Digital Forensic Research Workshop (DFRWS). Challenge participants were asked to develop new tools and techniques to extract as many files as possible from a DFRWS-prepared data set while reducing the number of false positives. Data carving techniques are used during digital forensics investigations and existing file carving tools typically produce many false positives...

Spanish cybercrime on the rise

Tuesday, August 29, 2006 (21:10:40)
Online fraud in Spain experienced a year-on-year growth of 50 percent in the first four months of 2006, the Computer Crime Research Center reports. Although cybercrime may not be viewed as a pressing concern in Spain, according to some sources, the country occupies third place in the world in the Internet fraud league table...

More (Financial Mirror)
  • Posted by: jamie
  • Topic: News
  • Score: 0 / 5
  • (710 reads)

Cops follow texting trail

Monday, August 28, 2006 (19:13:59)
Text messages, archived in cell phones, are now among the routine array of clues that detectives seek: At the very onset of an investigation, they can help finger a suspect quickly. In cases of missing or abducted people, they can be traced to the phone's user and general location. In divorce cases, they can provide proof of illicit affairs...

More (The Sacramento Bee)
  • Posted by: jamie
  • Topic: News
  • Score: 0 / 5
  • (825 reads)

CY4OR invest in Advanced Forensic Audio & Visual Suite

Sunday, August 27, 2006 (07:05:57)
Computer Forensic company CY4OR has increased its capacity to analyse audio and visual footage in response to a weighty demand for the service. The analysis suite has been developed and expanded to include the most comprehensive technology available on the market, and the audio & visual investigations team have also recruited a further member – Jae McCreary who joins CY4OR from BBC Radio. Audio & Visual images captured on CCTV cameras, personal video recorders, mobile phones or dictaphones can often hold compelling evidence for the prosecution or defence, however in the majority of cases the footage is not of a quality to be admissible in court...

2007 Conference on Digital Forensics, Security and Law

Saturday, August 26, 2006 (10:41:20)
The ADFSL 2007 Conference on Digital Forensics, Security and Law will be
held in Arlington, Virginia USA on April 18-20, 2007 and is calling for
papers and proposals in, or related to, the following areas.

1) Digital forensics curriculum
2) Cyber law curriculum
3) Information assurance curriculum
4) Accounting digital forensics curriculum
5) Digital forensics teaching methods
6) Cyber law teaching methods
7) Information assurance teaching methods
8 Accounting digital forensics teaching methods

Continued below...
  • Posted by: jamie
  • Topic: News
  • Score: 2 / 5
  • (962 reads)

DC3 Digital Forensics Challenge

Saturday, August 26, 2006 (06:43:53)
Do you or someone you know have what it takes to meet our Challenge? The Department of Defense Cyber Crime Center (DC3) has created it’s first Digital Forensics Challenge. This Challenge is open to any and all U.S. citizens in the continental United States. We invite you to join us and prove that your institution is a leader in the digital forensics community. Can your employees create new innovative tools and techniques that will benefit the digital forensics’ community? You can field as many teams as you like (up to 4 members per team) to take the challenge.

Please read carefully the following Challenge abstract...
  • Posted by: jamie
  • Topic: News
  • Score: 0 / 5
  • (4286 reads)

And you thought RAID was a challenge...

Saturday, August 26, 2006 (06:40:09)
What began as a home improvement project culminated in a system called Cleversafe. For companies and government agencies trying to secure networked data, it offers a simple way to store digital documents and other files in slices that can be reassembled only by the computers that originally created the files...

More (The New York Times)
  • Posted by: jamie
  • Topic: News
  • Score: 0 / 5
  • (778 reads)

Organized crime eyes online gamers

Saturday, August 26, 2006 (04:17:05)
Online gamers are thought to be a new target for fraudsters and organized crime, according to one industry specialist. Microsoft engineer Dave Weinstein claims that hackers can use Trojan horses to install keyloggers on systems to gain access to a user account. Once in an account, criminals can sell off the valuables such as weapons, gold and the character itself to make money...

More (BCS)