±Forensic Focus Partners

Become an advertising partner

±Your Account


Forgotten password/username?

Site Members:

New Today: 0 Overall: 36296
New Yesterday: 2 Visitors: 126

±Follow Forensic Focus

Forensic Focus Facebook PageForensic Focus on TwitterForensic Focus LinkedIn GroupForensic Focus YouTube Channel

RSS feeds: News Forums Articles

±Latest Articles

±Latest Videos

±Latest Jobs

Page 318

Mobile spy software use almost always illegal, says expert

Monday, September 11, 2006 (00:06:05)
A piece of software which allows a user to track another person's mobile phone use would be almost impossible to use in the UK without breaking the law, according to a surveillance law expert. Flexispy is the controversial software which is being sold by Thailand and UK based Vervata. Vervata's Flexispy.com site says that it is the "world's most powerful spy software for mobile phones"...

More (Out-Law.com)
  • Posted by: jamie
  • Topic: News
  • Score: 0 / 5
  • (1291 reads)

Acquire ewf images with ewfacquire on MacOSX/Freebsd/OpenBSD/Linux

Monday, September 11, 2006 (00:02:01)
Besides reading and writing (EnCase) EWF files with the libewf library, it's now possible to read and write SMART images as well. With the ewfacquire tool you now can create a bit-copy image from devices in the SMART image format (s01). The ewfacquire tool supports reading devices in Linux, FreeBSD, NetBSD, OpenBSD, MacOS-X/Darwin. On other platforms (Windows/Cygwin) it can convert a raw (dd) image into a EWF file or SMART file. With the tool you can acquire disk images just like in Encase or FTK and save the same meta data and hash value within the EWF or SMART file.

Usage ewfacquire:
./ewfacquire /dev/hda

The libewf library is integrated within the Sleuth Kit and so are the other tools. The libewf library comes with other tools to export data from EWF or SMART files (ewfexport), show the meta data stored in the EWF or SMART file (ewfinfo), and verify the integrity of the EWF or SMART files (ewfverify)

You can download the source code on the project website:

  • Posted by: jamie
  • Topic: News
  • Score: 0 / 5
  • (1126 reads)

High-tech lab fights crime of digital age

Friday, September 08, 2006 (19:02:02)
Imagine a laboratory filled with equipment advanced enough to locate deleted CP on a hard drive, recover old e-mails sent on a cell phone and trace the owner of a camera used to download photographs onto a laptop. Welcome to the FBI's new computer forensic laboratory unveiled Thursday in downtown Buffalo...

More (Buffalo News)
  • Posted by: jamie
  • Topic: News
  • Score: 0 / 5
  • (1018 reads)

ITNG 2007 Conference

Thursday, September 07, 2006 (17:56:42)
In 2007, I will be chairing a conference session on Cyber/Digital forensics for ITNG in Las Vegas, NV. The International Conference on Information Technology- New Generations (ITNG) is an annual event focusing on state of the art technologies pertaining to digital information and communication. The applications of advanced information technology to such domains as astronomy, forensics, information assurance, biology, education, geosciences, and health care are among topics of relevance to ITNG. Visionary ideas, theoretical and experimental results, as well as prototypes, designs, and tools that help the information readily flow to the user are of special interest. The conference features keynote speakers, the best student award, the PhD student forum and workshops/exhibits from industry, government and academia...(more below)
  • Posted by: baggili
  • Topic: News
  • Score: 0 / 5
  • (1165 reads)

Commodore 64 Confuses Austrian Police

Wednesday, September 06, 2006 (17:17:09)
"It seems that Wolfgang Priklopil, the communications technician who kidnapped Austrian pre-teen Natascha Kampusch, relied on a Commodore 64 as his primary machine. Interestingly this is presenting some problems to the Austrian computer forensics people. Major General Gerhard Lang of the Federal Criminal Investigations Bureau told reporters it would 'complicate investigators' efforts' and would be difficult to transfer the files to modern computers 'without loss.' Could this be the latest in the criminal world's security strategy? Can we expect to see Spectrums, Archimedes, and Atari STs turning up in police investigations soon?"

More (Slashdot)

“Computer says no”: the social aspects of computer misuse

Wednesday, September 06, 2006 (17:14:06)
16 years have passed since the primary piece of legislation to govern cyber-crimes and cyber-criminals (the Computer Misuse Act 1990) was passed, but the power of computer technology and our access to it in the workplace and the home have grown at an exponential rate. Computer misuse has increased in both scope and frequency and is now too ill-defined and fluid to be regulated effectively by the criminal law alone, argues Stefan Fafinski, law researcher at the University of Leeds and Managing Director of 1871 Ltd...

More (eGov monitor)

Computer forensics major introduced at Bloomsburg University

Tuesday, September 05, 2006 (18:23:41)
Bloomsburg University has introduced a new major that will train students to investigate the improper or illegal use of computers and digital devices, a field known as computer forensics. Computer forensics focuses on collecting, examining and presenting digitally stored evidence in criminal and civil investigations...

More (The Daily Item)
  • Posted by: jamie
  • Topic: News
  • Score: 0 / 5
  • (725 reads)

CyberSpeak September 3, 2006

Monday, September 04, 2006 (21:03:55)
Two Former Federal Agents Talk About Computer Forensics, Network Security and Computer Crime...

"This episode we have Keith Jones, Director of Computer Forensics, Incident Response, and Litigation Support for MANDIANT who recently testified as an expert witness in the UBS Painwebber trial. Check out his site at realdigitalforensics.com. We also talk about AOL's recent release of search query data, new fletc podcast, Apple's first look at Leapord, liveview forensic tool to boot vmware images, Sophos rootkit detector, free undelete utility, ftk imager, free conference calls at freeconference.com, record your conference calls at powergramo.com, and send files with senduit.com."

  • Posted by: jamie
  • Topic: News
  • Score: 0 / 5
  • (705 reads)

Digital forensic tool to curb web abuse

Monday, September 04, 2006 (18:16:06)
An Information technology expert has designed a digital forensic tool that can home in on workplace computers used for criminal activity or deliberate misuse of the Internet. Bennie Fei, a masters student at the University of Pretoria, warned that there was a growing need for computer forensics because of the the dramatic increase in crime relating to the Internet. According to Fei, state-of-the-art computer forensic tools such as EnCase or Forensic Toolkit were not capable of handling large volumes of data efficiently...

More (IOL)

Net browser promises private surf

Friday, September 01, 2006 (20:50:23)
A web browser has been released that promises total privacy for its users. Browzar, as it is known, automatically deletes all traces of the pages a person has visited, and the terms that they have searched for on the web...

More (BBC)