±Forensic Focus Partners

Become an advertising partner

±Your Account


Username
Password

Forgotten password/username?

Site Members:

New Today: 2 Overall: 35770
New Yesterday: 6 Visitors: 119

±Follow Forensic Focus

Forensic Focus Facebook PageForensic Focus on TwitterForensic Focus LinkedIn GroupForensic Focus YouTube Channel

RSS feeds: News Forums Articles

±Latest Articles

±Latest Videos

±Latest Jobs

Page 299

DC3 Digital Forensics Challenge

Saturday, August 26, 2006 (06:43:53)
Do you or someone you know have what it takes to meet our Challenge? The Department of Defense Cyber Crime Center (DC3) has created it’s first Digital Forensics Challenge. This Challenge is open to any and all U.S. citizens in the continental United States. We invite you to join us and prove that your institution is a leader in the digital forensics community. Can your employees create new innovative tools and techniques that will benefit the digital forensics’ community? You can field as many teams as you like (up to 4 members per team) to take the challenge.

Please read carefully the following Challenge abstract...
  • Posted by: jamie
  • Topic: News
  • Score: 0 / 5
  • (4288 reads)

And you thought RAID was a challenge...

Saturday, August 26, 2006 (06:40:09)
What began as a home improvement project culminated in a system called Cleversafe. For companies and government agencies trying to secure networked data, it offers a simple way to store digital documents and other files in slices that can be reassembled only by the computers that originally created the files...

More (The New York Times)
  • Posted by: jamie
  • Topic: News
  • Score: 0 / 5
  • (778 reads)

Organized crime eyes online gamers

Saturday, August 26, 2006 (04:17:05)
Online gamers are thought to be a new target for fraudsters and organized crime, according to one industry specialist. Microsoft engineer Dave Weinstein claims that hackers can use Trojan horses to install keyloggers on systems to gain access to a user account. Once in an account, criminals can sell off the valuables such as weapons, gold and the character itself to make money...

More (BCS)

U.K. Spammer Sentenced

Friday, August 25, 2006 (17:39:46)
A U.K. teen was sentenced to a two-month curfew after pleading guilty to sending about five million spam e-mails. The 18-year-old admitted that this act constituted a violation of Section 3 of the Computer Misuse Act. A U.K. insurance firm, the Domestic & General Group, was the lucky recipient of the messages. "This is the first successful prosecution in the UK for this type of offence," said DCI Charlie McMurdie, head of the Metropolitan Police's Computer Crime Unit...

More (SecurityProNews)

Downloading: the new work theft

Thursday, August 24, 2006 (15:36:05)
Until now, stealing from the company usually involved the odd piece of stationery or personal photocopying. But a conviction for downloading on the company computer has highlighted a new type of employment theft. Downloading files on the company computer might seem as innocent as swiping a company pen, but it can cost employers big bucks...

More (tvnz.co.nz)
  • Posted by: jamie
  • Topic: News
  • Score: 0 / 5
  • (995 reads)

Microsoft offers one-click police report via IM

Wednesday, August 23, 2006 (15:55:42)
Users of Windows Live Messenger or MSN Messenger in the United Kingdom can click a new button in the chat application to contact police with reports of suspicious behavior and instances of inappropriate sexual conduct online...

More (news.com)
  • Posted by: bjgleas
  • Topic: News
  • Score: 0 / 5
  • (1887 reads)

DOD eyes new forensics

Tuesday, August 22, 2006 (20:40:46)
The Defense Department issued a challenge to coders in an effort to get help in computer forensics and data analysis. Contestants will compete to uncover and recover digital data that’s been hidden or damaged. “They will be dealing with all of the things we encounter to obfuscate data,” said James Christy, director of the Cyber Crime Institute of the Defense Cyber Crime Center, in announcing the Challenge at the Black Hat Briefings. One of the center’s primary jobs is to provide forensics services for criminal investigations...

More (GCN)

Version 2.0 of StegAlyzerAS and StegAlyzerSS released

Monday, August 21, 2006 (16:38:41)
Backbone Security's Steganography Analysis and Research Center (SARC) has released version 2.0 of StegAlyzerAS (Steganography Analyzer Artifact Scanner) and StegAlyzerSS (Steganography Analyzer Signature Scanner). The new versions have significant new improvements including the ability to scan images of seized storage media in various formats and an enhanced user interface...
  • Posted by: jamie
  • Topic: News
  • Score: 0 / 5
  • (3449 reads)

NIST’s goal: Keep digital evidence fresh

Sunday, August 20, 2006 (06:12:11)
Scientists at the National Institute of Standards and Technology are known for sweating the nitty-gritty details of dull but vital standards for everything from bulletproof vests to medical measurement devices and IT encryption. And now, agency experts are bringing the same precision to computer forensics, fully aware that the final say lies in the notoriously low-tech realm of the judicial system...

More (GCN)
  • Posted by: jamie
  • Topic: News
  • Score: 0 / 5
  • (935 reads)

Dead disks yield live information

Friday, August 18, 2006 (22:24:36)
Identity thieves are gleaning personal information from scrapped computers...

More (Guardian)
  • Posted by: bjgleas
  • Topic: News
  • Score: 0 / 5
  • (2524 reads)