±Forensic Focus Partners

Become an advertising partner

±Your Account


Username
Password

Forgotten password/username?

Site Members:

New Today: 2 Overall: 35126
New Yesterday: 6 Visitors: 170

±Follow Forensic Focus

Forensic Focus Facebook PageForensic Focus on TwitterForensic Focus LinkedIn GroupForensic Focus YouTube Channel

RSS feeds: News Forums Articles

±Latest Articles

±Latest Webinars

Page 299

Sebek 3: tracking the attackers, part one

Saturday, January 28, 2006 (23:26:08)
It has become increasingly important for security professionals to deploy new detection mechanisms to track and capture an attacker's activities. Third Generation (GenIII) Honeynets provide all the components and tools required to gather this information at the deepest level. Sebek is the primary data capture tool for GenIII Honeynets...

More (SecurityFocus)
  • Posted by: jamie
  • Topic: News
  • Score: 0 / 5
  • (272 reads)

UK security professionals back tougher laws for hackers

Friday, January 27, 2006 (17:30:14)
The IT security industry has almost unanimously given its backing to government plans to update the Computer Misuse Act (CMA) and introduce more severe custodial sentences for cyber criminals. And many are urging the government to now 'go the distance' and ensure the bill is passed and the new laws come into effect as soon as possible - and are policed effectively...

More (silicon.com)
  • Posted by: jamie
  • Topic: News
  • Score: 0 / 5
  • (598 reads)

Paraben Corporation Provides Proactive Forensic Solutions

Thursday, January 26, 2006 (13:37:59)
"P2 Enterprise makes sure that not only is your network protected but you’ll have the evidence you need to prove your case as the incident occurs. P2 Enterprise Edition doesn’t stop with just traditional forensics; it takes forensics to a proactive level. P2 Enterprise gives you the ability to take screenshots of any client, track and monitor files accessed, programs installed, websites visited, or any number of other activities that can go against your organization’s policies and trigger a forensic acquisition if there are any violations..."

More (press release)
  • Posted by: jamie
  • Topic: News
  • Score: 0 / 5
  • (821 reads)

Guidance Software Adds Patrick Zeller to Legal and Regulatory Team

Wednesday, January 25, 2006 (15:50:36)
Guidance Software announced today that it has added Chicago-based litigator Patrick Zeller to the Legal and Regulatory team as assistant general counsel. As both a former assistant attorney general focused on computer crime and as eDiscovery and litigation counsel with the national law firm of Seyfarth Shaw, Zeller's career focus addresses the myriad of legal and compliance issues surrounding high technology...

More (press release)

Notre Dame probes hack of computer system

Tuesday, January 24, 2006 (15:06:15)
Two computer-forensic companies are helping the University of Notre Dame investigate an electronic break-in that may have exposed the personal and financial information of school donors...

More (CNET)
  • Posted by: jamie
  • Topic: News
  • Score: 0 / 5
  • (607 reads)

Expansion imminent for computer forensics at Bloomsburg University (US)

Monday, January 23, 2006 (16:21:36)
Governor Rendell recently announced that Bloomsburg University will receive two state grants: a $200,000 grant to support the Greater Susquehanna Keystone Innovation Zone and a $63,000 grant to support the Pennsylvania Center for computer forensics research...

More (Standard-Journal online)
  • Posted by: jamie
  • Topic: News
  • Score: 0 / 5
  • (689 reads)

Finding fraud in digital images (podcast)

Saturday, January 21, 2006 (15:08:36)
Associate professor of computer science Hany Farid is interested in detecting whether a digital image has been manipulated. Because digital images are found everywhere today, he explains that his research can be used to examine images to see if they have been tampered with. This has immediate relevance for the fields of law, media, and science. In this podcast, he talks about his work in digital forensics and how it can be implemented...

More (Dartmouth News)
  • Posted by: jamie
  • Topic: News
  • Score: 0 / 5
  • (520 reads)

CERT's Virtual Training Environment (VTE) Open to Public

Friday, January 20, 2006 (21:50:06)
CERT's Virtual Training Environment (VTE), with more than 160 hours of multimedia-based instruction in information assurance and computer forensics, is now available to the public.

The Virtual Training Environment (VTE) is a Web-based knowledge library for Information Assurance, computer forensics and incident response, and other IT-related topics. VTE is produced by the Software Engineering Institute at Carnegie Mellon University.

http://vte.cert.org/
  • Posted by: bjgleas
  • Topic: News
  • Score: 0 / 5
  • (1479 reads)

Tracing An Email

Friday, January 20, 2006 (17:26:42)
The purpose of this guide is to show the process involved in tracing an email. The first step required to tracing an email is finding out the headers of the email. What are headers? Email headers are lines added at the top of an email message that are used by servers as the email goes on route to get delivered. Generally email clients only show the standard To, From, and Subject headers, but there are more...

More (Onimoto)
  • Posted by: jamie
  • Topic: News
  • Score: 5 / 5
  • (620 reads)

New computer forensics lab cracks down on identity theft

Thursday, January 19, 2006 (16:46:42)
Pierce County is attacking identity theft with new technology and vigor that could warn potential victims sooner and lock up crooks longer. Investigators from the prosecutor’s office and sheriff’s department have opened a computer forensics lab that allows them to dig deeper into the hardware and software Pierce County law enforcement officers seize as part of identity theft cases...

More (TheNewsTribune.com)
  • Posted by: jamie
  • Topic: News
  • Score: 0 / 5
  • (998 reads)