±Forensic Focus Partners

Become an advertising partner

±Your Account


Username
Password

Forgotten password/username?

Site Members:

New Today: 0 Overall: 34714
New Yesterday: 2 Visitors: 220

±Follow Forensic Focus

Forensic Focus Facebook PageForensic Focus on TwitterForensic Focus LinkedIn GroupForensic Focus YouTube Channel

RSS feeds: News Forums Articles

±Latest Articles

±Latest Webinars

Page 306

UK MP wants convicted hackers to face up to ten years behind bars

Thursday, July 14, 2005 (14:16:36)
A Labour MP is attempting to raise the maximum sentences that can be handed down on UK citizens who are convicted of hacking and DoS attacks. Tom Harris, MP for Glasgow South, introduced a bill on Tuesday to update the Computer Misuse Act. Harris wants the maximum sentence for accessing data without authorisation increase from six months to two years, and the maximum sentence for modifying data without authorisation lifted to 10 years from five at present...

More (ZD Net UK)

5th Annual Digital Forensic Research Workshop

Wednesday, July 13, 2005 (21:34:45)
Early registration for the 5th Annual Digital Forensic Research Workshop ends this Friday, July 15, 2005.

This year the workshop is in New Orleans, August 17-19. The workshop is designed to provide a forum for researchers and practitioners with interests in digital forensics to share results, knowledge, and experience. This year's program is now available online at:

http://www.dfrws.org/2005/program.html

For more information about DFRWS05 and to register, go to:

http://www.dfrws.org/2005/index.html
  • Posted by: jamie
  • Topic: News
  • Score: 0 / 5
  • (362 reads)

Computer Forensics Explained: A Primer for Physical Security Professionals

Wednesday, July 13, 2005 (14:58:29)
This article introduces computer risk and more specifically computer incident response and forensics to an audience who is traditionally accustomed to implementing physical controls such as camera surveillance, physical access, and alarm systems throughout their facility. We'll look at the methodology used during a computer incident, as well as the steps taken during a computer forensics investigation subsequent to an incident. Finally, a real case study will be introduced to fortify the points and demonstrate incident response in practice...

More (SecurityInfoWatch.com)
  • Posted by: jamie
  • Topic: News
  • Score: 0 / 5
  • (492 reads)

Version 2.02 of The Sleuth Kit now available

Monday, July 11, 2005 (15:49:33)
Bug Fixes
- fls could crash if FAT short name did not exist
- Linux header file problem with some distros.
- Missing UFS / Ext2/3 file names (if deleted file claimed it used that data).
- Missing FAT directory entries with ils (if initial entries in cluster were invalid).
- Missing NTFS file if no $DATA or $IDX_* attributes existed (which meant the file had no content).

Updates
- Support for OS X Tiger.
- Internal design improvements and memory leak fix.
- 'ils -o' was readded as 'ils -O'.
- 'mactime -m' was added so that month is printed as number instead of name.

MD5: d8f53a69069369ee20a4ce623eb640b5

http://www.sleuthkit.org/sleuthkit/
  • Posted by: jamie
  • Topic: News
  • Score: 0 / 5
  • (395 reads)

UK computer forensics firm plays key role in investigation

Friday, July 08, 2005 (13:06:32)
A computer forensics firm from Sawbridgeworth has played a key role in a criminal investigation. Crucial evidence from company DataSec led to the convictions of Terry Butler and David Weightman, whose computer equipment contained tens of thousands of CP images. The specialist business was employed by Essex Police to examine computers and disks seized at their addresses in South Woodham Ferrers and Peckham.

New High Tech Crime Lab Opens in Salt Lake City, US

Thursday, July 07, 2005 (14:10:03)
A new high-tech crime lab (one of the FBI's Regional Computer Forensics Labs) opened yesterday in Salt Lake City, Utah, USA...

More (KSL News)

PCMCIA write-blocking pod from Vogon announced

Thursday, July 07, 2005 (14:06:35)
Vogon International has launched a ‘PCMCIA write-blocking pod’ as an addition to its investigation hardware product portfolio. Developed in Vogon's laboratories, this is claimed to be the only commercially available product of its kind, and aimed at forensic investigators involved in examining electronic equipment.

More (press release)

Apple's iPod a useful tool for criminals

Tuesday, July 05, 2005 (12:01:50)
"Similar to the way the personal computer became common in the home in the '80s and '90s, the iPod is becoming common today," Dr. Marcus Rogers, a cybercrime expert at Purdue University's Center for Education and Research in Information and Security, in West Lafayette, Ind., wrote in a recent report, "iPod Forensics." This growing popularity, Rogers continued, "has allowed a criminal element to find 'alternative' uses for a seemingly harmless device, and the Apple iPod is finding its way into the criminal's bag of tricks."

More (PhysOrg.com)

De Montfort to train cyber sleuths in UK

Monday, July 04, 2005 (15:26:18)
A British university is to offer a four-year sandwich degree course in computer forensics. Leicester's De Montfort University is hoping to recruit 20 students for the course, which begins in September and is one of only five of its kind in the UK...

More (silicon.com)

Cyber crime leaves police in dust

Friday, July 01, 2005 (09:42:27)
Federal agents are in a familiar position as they probe the computer-security breach at an Arizona firm that left credit-card data for some 40 million people open to theft: Once again, they're playing catch-up. Faced with the vastness of cyberspace, the technical prowess of the thieves and the runaway pace of technology, finding the culprits is no simple matter. ''Unfortunately, the nature of cyber crime and identity theft is such that law enforcement will probably always be involved in a game of catch-up,'' said Paul Luehr, Minneapolis-based vice president for Stroz Friedberg, a national computer forensics and consulting firm...

More (Miami Herald)