±Forensic Focus Partners

Become an advertising partner

±Your Account


Forgotten password/username?

Site Members:

New Today: 0 Overall: 35390
New Yesterday: 0 Visitors: 129

±Follow Forensic Focus

Forensic Focus Facebook PageForensic Focus on TwitterForensic Focus LinkedIn GroupForensic Focus YouTube Channel

RSS feeds: News Forums Articles

±Latest Articles

±Latest Webinars

Page 299

New paper - Forensic Analysis of the Windows Registry

Friday, April 07, 2006 (16:22:28)
A new paper, "Forensic Analysis of the Windows Registry" by Lih Wern Wong, is now online here.
  • Posted by: jamie
  • Topic: News
  • Score: 0 / 5
  • (687 reads)

New Software Tool Enhances Evidence Gathering Capabilities

Thursday, April 06, 2006 (14:38:36)
The first digital forensic software tool capable of automatically reassembling fragments of graphic images, even when information regarding the locations of the fragments no longer exists, has been developed. The tool will greatly enhance the amount of evidence that can be gathered during digital forensic investigations such as those involving CP and counterfeiting...
  • Posted by: jamie
  • Topic: News
  • Score: 5 / 5
  • (1142 reads)

IT chiefs need forensic expertise

Wednesday, April 05, 2006 (14:09:34)
Firms need more staff with computer forensic skills and should lobby suppliers for safer products, according to speakers at last week’s E-Crime Congress in London. Simon Janes of data recovery vendor Ibas, and former head of Scotland Yard’s Computer Crime Unit, said that big companies need to develop more expertise in computer forensics...

More (computing)

City to take aim at high-tech criminals

Monday, April 03, 2006 (16:16:20)
An increase in high-tech crime is forcing police to undergo special training to successfully investigate such cases. To ensure there are enough trained investigators the Thousand Oaks City Council approved a $40,207 payment last week to help fund three new computer forensic examiner positions in the Ventura County High-Tech Task Force...

More (Thousand Oaks Acorn)

Schenectady IT company spins off burgeoning forensics business

Wednesday, March 29, 2006 (17:33:08)
Jeffrey Trombly doesn't have a Sam Spade-style fedora or a Sherlock Holmesian deerstalker cap, but he is in the detective business. Trombly is half of the two-man IT company that does business as Empire Technology Solutions. He has been doing computer forensics since 2003...

More (The Business Review)

UB, FBI and ECC to Co-Host Cybersecurity Workshop

Tuesday, March 28, 2006 (16:29:37)
Buffalo is fast becoming a center for research, education and new practices in cybersecurity and computer forensics, according to the hosts of a workshop on these topics to be held March 31 in the Center for Tomorrow on the University at Buffalo North (Amherst) Campus...
  • Posted by: jamie
  • Topic: News
  • Score: 0 / 5
  • (3120 reads)

New paper: Evidentiary Value of Link Files

Monday, March 27, 2006 (23:20:44)
A new paper, "Evidentiary Value of Link Files" by Nathan Weilbacher, has been added to the Papers & Articles page.

Computer Forensics Helping Texas Police Statewide

Monday, March 27, 2006 (16:00:18)
He is alone in front of his computer, and with the click of a button, his crime is erased -- or so the technically savvy criminal may think. And to extract the evidence from computer hard drives, cell phones, personal digital assistants and iPods, law enforcement agencies are turning to federal, state and private computer forensics experts to delve into the digital data's depths...

More (officer.com)

Private Forensic Examinations in RIAA case

Sunday, March 26, 2006 (02:58:22)
As part of their investigation into illegal music downloading, the RIAA demanded full access to a suspect's computer, which the accused felt was a violation of her privacy. The judge agreed with her and is letting her hire her own forensics expert, and bill the RIAA for any expenses...

More (RIAA p2p file share defeat)
  • Posted by: bjgleas
  • Topic: News
  • Score: 0 / 5
  • (1274 reads)

The effective response to computer crime

Wednesday, March 22, 2006 (15:47:45)
The attraction of computer-based crime is obvious. Twenty years ago corporate spies would find it difficult to steal the entire contents of a filing cabinet, but today they can take far more by slipping a disc into their pocket or e-mailing data to an online electronic swag bag. It is much easier to steal, leak, manipulate or destroy electronic data. But just as in the physical world, cyber-criminals leave their electronic fingerprints all over a digital crime scene...

More (ComputerWeekly.com)