More (This is Guernsey)
±Forensic Focus Partners
|New Today: 0||Overall: 35535|
|New Yesterday: 1||Visitors: 150|
Back to top Skip to content Skip to menu
Page 313Back to top Back to main Skip to menu
Thursday, November 10, 2005 (15:11:48)Danish web hosting company EasySpeedy (http://easyspeedy.com) has added a software-based Forensic investigation utility to its Remote Recovery System. The company, who specializes in hosting dedicated servers and Linux/BSD, suggests the utility will enable customers to remotely recover their data while checking servers for signs of malicious intrusion...
Thursday, November 10, 2005 (15:05:39)T3i, a leading information security consulting firm, announced today that it has launched its Information Forensics Digital Technology Laboratory (DTL). The Hi-Tech Digital Laboratory was established in order to provide T3i clientâ€™s with an expanded range of services including digital forensics for computers, networks, PDAâ€™s, cell phones, flash drives and other peripherals, as well as digital critical data recovery for deleted files, emails, passwords and graphics.
Wednesday, November 09, 2005 (17:19:59)The reason the Secret Service puts so much emphasis on computer forensics is fairly simple: Computers are where the clues are. â€œToday, just about every crime scene has some form of digital evidence,â€ said Dale Pupillo, deputy special agent in charge of the agencyâ€™s Criminal Investigative Division. And the types of crime that most commonly involve computer use are often right up the Secret Serviceâ€™s alley...
Tuesday, November 08, 2005 (18:42:35)A commitment to establishing a computer forensics operation is an expensive proposition, and itâ€™s not a one-time purchase decision. Computers and software have to be upgraded frequently. New technologies, such as cell phones and personal digital assistants, require new tools and training. Analysts need to constantly refresh their skills...
Monday, November 07, 2005 (17:21:54)Last month, the Sacramento Valley Hi-Tech Crimes Task Force, along with the U.S. Attorneyâ€™s Office and the Secret Service, busted what they described as a massive DVD pirate ring. When the case goes to court, the prosecuting attorneys should have some strong evidence, thanks to both the cybersleuthing prowess of the detectives and additional information provided by optical-disk forensic software. This software can read information embedded on DVDs and CDs that canâ€™t be viewed by normal means...
Friday, November 04, 2005 (19:23:31)Three men who sent thousands of emails purporting to come from eBay, and four others who acted as so-called money mules, were sent to prison by Preston Crown Court yesterday, marking the first convictions for a UK-run phishing operation...
Friday, November 04, 2005 (19:20:53)A British teenager has been cleared of launching a denial-of-service attack against his former employer, in a ruling that delivers another blow to the U.K's Computer Misuse Act. At Wimbledon Magistrates Court in London, District Judge Kenneth Grant ruled Wednesday that the teenager had not broken the CMA, under which he was charged. The defendant, who can't be named for legal reasons, was accused of sending 5 million e-mail messages to his ex-employer that caused the company's e-mail server to crash...
Friday, November 04, 2005 (18:20:08)A team of computer sleuths is hard at work in Herndon, doing everything from telling clients how secure their network to doing computer forensic work to figuring out what files a client's disgruntled employee might have leaked to a competitor. The Emerging Technologies Group Inc. (ETG) recently moved its corporate headquarters to Herndon from Huntsville, Ala., and is waiting on completion of its new 10,000-square-foot space in a Worldgate office building...
Thursday, November 03, 2005 (16:48:01)If your employer accuses you of hacking into the companyâ€™s computing system and perpetrating a fraud, and you happen to be guilty, what is your safest tactic if you want to escape criminal charges? The answer is: Ask them to prove it. One out of three times, even if computer forensics experts are brought in and given unfettered access to all systems, it will be impossible to prove who is guilty of what. The reason is that few computer networks maintain comprehensive audit trails of who did what and when...