±Forensic Focus Partners

Become an advertising partner

±Your Account


Username
Password

Forgotten password/username?

Site Members:

New Today: 0 Overall: 35997
New Yesterday: 0 Visitors: 123

±Follow Forensic Focus

Forensic Focus Facebook PageForensic Focus on TwitterForensic Focus LinkedIn GroupForensic Focus YouTube Channel

RSS feeds: News Forums Articles

±Latest Articles

±Latest Videos

±Latest Jobs

Page 313

WIT (Ireland) Announces Degree in Computer Forensics

Tuesday, June 20, 2006 (16:46:37)
The computer forensics stream is being introduced to the Institute's four-year BSc (Hons) in Applied Computing to meet the demand for expertise across the public and private sectors in Ireland and overseas. As well as helping to combat corporate crime, graduates from the degree will be equipped with skills in the recovery and analysis of deleted, cached and hidden data from desktop and laptop computers as well as other equipment including mobile phones and personal digital assistants (PDAs)...

More (Irish Developer Network)

UK government's encryption key plan could backfire, warns expert

Tuesday, June 20, 2006 (03:06:17)
The clause of a law which forces people to hand over encryption keys will be activated after controversy delayed its implementation for six years. But one security expert has warned that the law itself could cause more criminals to turn to encryption...

More (Out-Law.com)

Newport Uni, Wales, launches computer forensics course

Monday, June 19, 2006 (19:49:11)
Newport University's Business School will launch a graduate course in computer forensics this September. Speaking at the B2B Wales event in Cardiff, Tony Corner, head of computing at Newport Business School, and Eric Llewellyn, senior lecturer in computing, announced the course at a seminar covering the business impact of computer forensics. As online and computer-based activity has become a significant portion of everyday life, the field of e-crime investigation has also been broadened, leading to a demand for qualified forensic specialists...

More (Ping Wales)

Forensics day in UK will reveal tracing techniques

Friday, June 16, 2006 (15:45:56)
What happens if a suspect deliberately attempts to remove all traces of his activity from his PC? This and other forensic issues will be covered on 12 July in London at a seminar run by BCS's Information Security SG.

Full details at http://www.bcs-issg.org.uk/next%20event.html
  • Posted by: jamie
  • Topic: News
  • Score: 0 / 5
  • (590 reads)

Computer Forensics Firm Warns of Web Mole Threat

Wednesday, June 14, 2006 (15:00:04)
UK computer forensics firm, Zentek Forensics, claims that whilst web-jacking is a new phenomena for home PC users, similar techniques are being widely-used in commercial environments. Web-jacking involves planting a Trojan on a PC or server in order to gain access to or steal files, often with criminal intent. Trojan programs are so-called because they enter a system in a seemingly harmless way, but once activated release “malicious code” which effectively unlocks a back-door to PCs and servers. Whereas home PC users are being taken in by the use of ‘pop-ups’ to plant the Trojan, businesses face an even bigger potential threat – from their people. In today’s cut-throat business environment, there is a rise in cases of companies sending spies into competitors. The moles’ go ‘undercover’ as employees to plant the Trojan directly onto computer hard drives, usually via a portable storage device such as a memory stick...
  • Posted by: jamie
  • Topic: News
  • Score: 5 / 5
  • (1096 reads)

Retain or restrain access logs?

Tuesday, June 13, 2006 (12:17:22)
A recent proposal by the U.S. Department of Justice that would mandate Internet Service Providers to retain certain records represents a dangerous trend of turning private companies into proxies for law enforcement or intelligence agencies against the interests of their clients or customers...

More (Security Focus)
  • Posted by: jamie
  • Topic: News
  • Score: 0 / 5
  • (831 reads)

Merging to Better Track Computer Crimes

Monday, June 12, 2006 (14:43:57)
Vacant space in the City-County Building has Madison Police and the Dane County Sheriff's Department is expanding their computer crime units. And it's not just about more space -- it's about handling more cases. The new city/county computer crime facility will allow both departments to share resources as well as expenses -- which is especially important in these tight budget times. But money aside, law enforcement officials say joining forces will help them catch criminals faster...

More (WKOW)
  • Posted by: jamie
  • Topic: News
  • Score: 0 / 5
  • (1265 reads)

UK looks to get tough on cybercrime

Thursday, June 08, 2006 (16:43:46)
Tightening up existing legislation will help UK authorities to prosecute hackers better and put them in prison longer – but analysts question whether the moves will constrict an explosive growth in costly cybercrime. The UK has sought to tighten the CMA (Computer Misuse Act) of 1990 to more precisely target DoS (denial of service) attacks. Other legal cases in recent years have also brought into question whether the law, composed of three sections, was keeping up with rapid changes in technology...

More (PC Advisor)

Professor helps bust cyber criminals

Wednesday, June 07, 2006 (12:36:08)
Marcus Rogers started as a beat cop, but it's what he did on the side that led him to busting cyber crooks. Now an associate professor of computer technology, Rogers used to run his own Internet service provider and build computers to sell. He did this while in law enforcement in Canada. But eventually he put his two loves together to become a technological crime fighter. He got into cyber forensics...

More (The Exponent)

Cybercrime spurs college courses in digital forensics

Tuesday, June 06, 2006 (18:59:31)
One of the hottest new courses on U.S. college campuses is a direct result of cybercrime. Classes in digital forensics — the collection, examination and presentation of digitally stored evidence in criminal and civil investigations — are cropping up as fast as the hackers and viruses that spawn them...

More (USA Today)