±Forensic Focus Partners

Become an advertising partner

±Your Account


Username
Password

Forgotten password/username?

Site Members:

New Today: 2 Overall: 35126
New Yesterday: 6 Visitors: 132

±Follow Forensic Focus

Forensic Focus Facebook PageForensic Focus on TwitterForensic Focus LinkedIn GroupForensic Focus YouTube Channel

RSS feeds: News Forums Articles

±Latest Articles

±Latest Webinars

Page 306

IT Security Breach? Don’t just step in CSI Style

Wednesday, November 02, 2005 (04:28:55)
In every company in the UK there is likely to be a PC, and therefore an IT security breach is almost inevitable. These are the findings of the 2005 National High Tech Crime Unit report into the effect of computer crime on businesses. The main concern for said decision makers after a breach had occurred was how to maintain business continuity. However if half of IT staff employed within companies have no formal IT security qualifications, what exactly must you do to stop your business grinding to a halt? Firstly don’t step in guns blazing CSI style – the Channel 5 TV show that is. Although the glossy crime series has brought Computer Forensics to the forefront of public awareness, it does little to reflect the correct and essential procedures that must be put in place once there is suspicion of criminal activity...
  • Posted by: jamie
  • Topic: News
  • Score: 4 / 5
  • (945 reads)

Seminar addresses digital forensics issues

Tuesday, November 01, 2005 (21:08:55)
Dr. Victor Fay-Wolfe, a computer science and statistics professor at the University of Rhode Island, spoke Friday in Pastore Chemical Laboratory concerning the field of digital forensics. Digital forensics, which Fay-Wolfe defined as "the application of forensic science technology to the discovery, collection, and analysis of digital evidence," is a form of forensic investigation that focuses on computers, PDAs, printers, servers and any other electronic devices that can hold information vital to an investigation...

More (The Good 5 Cent Cigar)
  • Posted by: jamie
  • Topic: News
  • Score: 0 / 5
  • (868 reads)

Cyber crime business booming

Tuesday, November 01, 2005 (00:49:57)
Television crime shows such as "CSI" have brought the science of computer forensics to the forefront of public awareness. But just like about everything coveted by Hollywood, there exists a significant gap between art and reality. No one knows that better than real-life computer forensics investigator Angelique Grado, of The Woodlands. Vice president and director of operations of CyberEvidence Inc., Grado is quick to point out that what makes for a good script doesn't always qualify as proper technique...

More (The Villager)
  • Posted by: jamie
  • Topic: News
  • Score: 4 / 5
  • (908 reads)

Version 3.0 EMail Detective released by Hot Pepper Technology, Inc.

Friday, October 28, 2005 (05:59:46)
Hot Pepper Technology, Inc. (http://www.hotpepperinc.com) has announced the release of version 3.0 of its E-Mail Detective - Forensic Software Tool. E-Mail Detective (EMD) provides investigators with a rapid and comprehensive method of retrieving all America Online E-mail messages and photos stored on a user's computer disk. This updated version adds several new features and enhancements to the application. Version 3.0 offers enhanced AOL reporting features for the investigator: built in key phrase search, automatic hash value tagging, quick scan capability and the ability to run the EMD application from a USB jump drive for field investigations.
  • Posted by: jamie
  • Topic: News
  • Score: 0 / 5
  • (920 reads)

Computer forensics making a difference

Thursday, October 27, 2005 (18:39:14)
For the last four years, David Usery, 47, has been a man the public doesn’t see — a pivotal person behind thousands of criminal case investigations from the 9th judicial District Attorney’s Office and New Mexico State Police as well as local law enforcement. Usery is the Information Systems Manager for the DA’s office. He is a computer forensics expert and prepares computer-generated maps, images and animation for courtroom presentations. The evidence Usery gathers from hard drives is damning, “I’ve never had to testify in court, they (defendants) usually plead,” he said...

More (Portales News-Tribune)
  • Posted by: jamie
  • Topic: News
  • Score: 0 / 5
  • (794 reads)

Fighting cybercrime on a shoestring budget

Wednesday, October 26, 2005 (20:21:45)
In cramped, dingy offices near New York’s East River, a couple dozen detectives and analysts hunch over computers, plowing their way through hundreds of criminal cases. This is the home of the New York Police Department Computer Crime Squad. The heart of this or any other computer crimes unit is computer forensics, the conservation, deconstruction and analysis of electronic evidence contained on personal computers, networks and, increasingly, handheld devices such as cell phones and personal digital assistants...

More (GCN)

Digital fingerprint cracks the case

Wednesday, October 26, 2005 (01:01:41)
Last month, when Australian Federal Court Judge Murray Wilcox ruled that Kazaa is illegally authorising copyright infringement, he put Australia on the world map of landmark intellectual property cases - related cases against Kazaa in the US had previously failed. But Wilcox's finding has also put Australia on the map for another reason. Wilcox relied on crucial digital evidence from forensic computer specialists. In a situation where there was no smoking gun, these specialists were able to build a solid case on purely digital evidence...

More (The Age)

Microsoft, Nigeria Join Forces Against Cybercrime

Monday, October 24, 2005 (17:48:05)
Microsoft Latest News about Microsoft is lending its I.T. expertise to the government of Nigeria in a joint effort to combat e-mail fraud and other cybercrimes in the African nation...

More (Top Tech News)

Computer Evidence: Collection & Preservation

Saturday, October 22, 2005 (12:39:00)
Computer Evidence: Collection and Preservation teaches law enforcement and computer forensics investigators how to identify, collect, and maintain digital artifacts to preserve their reliability for admission as evidence. The book focuses on collection and preservation because these two phases of computer forensics are the most critical to evidence acceptance, but are not thoroughly covered in text or courses. Throughout the book, a constant eye is kept on evidence dynamics and the impact investigators can have on data integrity while collecting evidence.

More (HNS)

Secret tracking codes in laser printers cracked

Friday, October 21, 2005 (14:02:59)
The pages that are printed by your colour laser printer may include tiny dots, almost invisible to the naked eye. The dots form a code that can be read by the US Secret Service, ostensibly to track down counterfeiters. Now, for the first time, the code has been cracked. The Secret Service has admitted before that the tracking information is part of a deal struck with selected colour laser printer manufacturers – including Xerox, Canon and many others. If a colour laser printer is used to forge a document and agents get sight of the document, the codes can be read. However, the full nature of the private information encoded in each document was not previously known...

More (Out-Law.com)