±Forensic Focus Partners

Become an advertising partner

±Your Account


Forgotten password/username?

Site Members:

New Today: 1 Overall: 35535
New Yesterday: 5 Visitors: 127

±Follow Forensic Focus

Forensic Focus Facebook PageForensic Focus on TwitterForensic Focus LinkedIn GroupForensic Focus YouTube Channel

RSS feeds: News Forums Articles

±Latest Articles

±Latest Webinars

Page 339

N.H. Focuses On Computer Crime

Monday, December 27, 2004 (04:12:06)
New Hampshire is stepping up its fight against computer criminals. Speaking at a conference on white-collar crime, Attorney General Kelly Ayotte said her office is considering a proposal to create a "master computer brain" to help investigate computer crime. The machine would help investigators decode information on computers seized as evidence.

More (Computer Crime Research Center)

DoD Cyber Crime Conference

Thursday, December 23, 2004 (23:33:41)
REGISTER TODAY for This Timely Conference
4th Annual DoD Cyber Crime Conference & Exposition
Cyber Crime -- Overcoming the Challenges of New Technology

Conference Dates: January 10-14, 2005

Pre-Conference Training: ILook 8 Training Course and other CEU courses, January 9-10, 2005

Exposition Dates: January 10-11, 2005

Location: Westin Innisbrook Golf Resort, Palm Harbor, FL, (Clearwater/Tampa Area)

For Details and to Register Visit: http://www.DODCyberCrime.com/
  • Posted by: Sharla
  • Topic: News
  • Score: 0 / 5
  • (913 reads)

UK government to delete millions of emails

Tuesday, December 21, 2004 (13:06:31)
It has led to the downfall of many. Now the UK government is arranging the deletion of millions of e-mails. But is it really as easy as hitting a button on the keyboard? E-mail has a long memory, as former home secretary David Blunkett can confirm. Forced to quit last week after e-mails containing damaging information were discovered, he is the latest in the long line of people to be haunted by cyber mail. It has now emerged that civil servants are being told to destroy millions of e-mails. The government says it is in the cause of good information management, but some people have pointed out that in a fortnight's time, they will become publicly accessible under freedom of information legislation. However, as many have discovered, it is not as easy as hitting the delete key...

More (BBC)

Real-world data recovery dramas

Tuesday, December 21, 2004 (13:04:03)
"Do as I say, not as I do", ought to be the catchphrase of many IT executives. We all know about the unwritten law that computer hard drives crash only when it's going to do most damage. Fortunately, Computer Forensics has seen almost all the real-life data dramas before - including some that almost require you to suspend your disbelief...

More (iStart)

Authorities use computers to track down woman accused of murder

Saturday, December 18, 2004 (20:44:50)
Authorities say they used computer forensics to zero in on a Kansas woman accused of killing another woman and stealing her unborn baby. The baby, that had been cut out of her mother's womb, was found alive Friday after a frantic search, and authorities arrested the woman they say strangled the child's mother. The baby girl is said to be in good health.

More (WMTW)

Napier 'spy' software set to fight terrorism

Tuesday, December 07, 2004 (21:01:11)
Computer "agents" which can help fight global terrorism and organised crime are being developed by scientists at an Edinburgh university. Academics at Napier University are creating software programs which act as detectives - accessing other computers via the internet or wireless technology and seeking out signs of criminal activity. Dr Bill Buchanan, leader of the Distributed Systems research group in the institute’s School of Computing, is working with the Police Information Technology Organisation (PITO) to produce the software, which he says is more reliable and trustworthy than human investigators.

More (Edinburgh Evening News)

UK man jailed after computer forensics investigation

Monday, December 06, 2004 (12:18:19)
Computer forensics leads to conviction for UK man at Warrington Crown Court

More (Cheshire Online)
  • Posted by: Andy
  • Topic: News
  • Score: 0 / 5
  • (1883 reads)

Cellphone Forensic Software Open Sourced

Saturday, December 04, 2004 (14:40:33)
The Netherlands Forensic Institute (part of the Dutch Ministry of Justice) has open sourced one of their high-profile software frameworks, TULP2G. With this BSD licensed framework, one can extract and decode all data from GSM SIM cards, e.g. called phone numbers and received SMS messages. This was previously only possible with commercial software.

More (Slashdot)

Computer forensics aids schoolyard fight investigators

Wednesday, December 01, 2004 (13:26:20)
A second teen has been charged in a schoolyard fight that was videotaped, set to music and sold to high school students in an edited form. With the help of Beaverton computer forensics company NTI Breakwater, police were able to remove an overlay of rap music and restore the original audio track and edited segments to the recording, allowing investigators to hear what was said in the Junction City High School parking lot the evening of Oct. 21.

More (The Register-Guard)

Version 0.69 of the Honeywall CDROM released

Monday, November 22, 2004 (16:05:21)
The Honeynet Project has announced the release of version 0.69 of the Honeywall CDROM. Some key features of this new version include

- - Whitelisting: The ability to identify IP's and networks you
want to allow inbound and outbound of your honeynet, but do not want to log or alert on.
- - Blacklisting: The ability to identify IP's and networks you
want to deny inbound and outbound of your honeynet and do not
want to log or alert on.
- - Traffic Summary: Improved traffic summary reporting, with
the addition of Snort alerts, Snort-Inline alerts, and
Suspicious traffic.

More (The Honeynet Project)