±Forensic Focus Partners

Become an advertising partner

±Your Account


Username
Password

Forgotten password/username?

Site Members:

New Today: 0 Overall: 36561
New Yesterday: 0 Visitors: 93

±Follow Forensic Focus

Forensic Focus Facebook PageForensic Focus on TwitterForensic Focus LinkedIn GroupForensic Focus YouTube Channel

RSS feeds: News Forums Articles

±Latest Articles

±Latest Videos

±Latest Jobs

Page 342

State funding sought to fight computer crimes in Maine

Wednesday, March 15, 2006 (12:48:41)
Michael Cantara gets a knot in his stomach when he thinks about the backlog of computers that have yet to be analyzed as evidence in CP cases. Cantara, commissioner of the Department of Public Safety, asked lawmakers Monday to give him two more investigators to address the 60-case backlog...

More (MaineToday.com)
  • Posted by: jamie
  • Topic: News
  • Score: 0 / 5
  • (356 reads)

Computer crime non-typical for Macedonia

Wednesday, March 15, 2006 (12:45:19)
A regional conference on the theme Credit Card Frauds opened in Skopje on Tuesday. SECI's Task Force on Combating Financial and Computer Crime organized the event. The conference brought representatives of 12 member-states of the SECI Regional Center for Combating Transborder Crime...

More (makfax)
  • Posted by: jamie
  • Topic: News
  • Score: 0 / 5
  • (504 reads)

Target checklist: Socks, shampoo, forensics

Tuesday, March 14, 2006 (16:57:41)
...when the tape proved too fuzzy to use, investigators turned to one of the most sophisticated forensic labs in the country to help solve the case -- at the Target Corp. The retailer's technicians cleaned up the tape and helped identify the suspect, leading to his arrest and conviction. It was one of the first cases in Target's surprising, and rapidly expanding, role as national crime fighter...

More (StarTribune.com)
  • Posted by: jamie
  • Topic: News
  • Score: 0 / 5
  • (466 reads)

How to legislate against hackers

Monday, March 13, 2006 (15:47:41)
Everyone is in favour of sending hackers to prison for longer, but technology commentator Bill Thompson wonders if our MPs are competent to make good cyber-laws...

More (BBC)

Crime: The Real Internet Security Problem

Sunday, March 12, 2006 (02:16:35)
Google TechTalks
January 24, 2006

Phillip Hallam-Baker

  • Posted by: jamie
  • Topic: News
  • Score: 0 / 5
  • (877 reads)

Call For Papers - Digital Forensics Research Workshop (DRFWS) 2006

Friday, March 10, 2006 (16:50:11)
Call for Papers
The 6th Annual
Digital Forensic Research Workshop
(DFRWS 2006)
August 14-16, 2006
Purdue University
Lafayette, Indiana, USA
www.dfrws.org
dfrws2006 (at) dfrws (dot) org

The purpose of this workshop is to bring together researchers,
practitioners, and educators interested in digital forensics. We
welcome the participation of people in industry, government, law
enforcement, and academia who are interested in advancing the state
of the art in digital forensics by sharing their results, knowledge,
and experiences. The accepted papers will be published in printed
proceedings.

Click "Read More" below for further details

Cyberthreats? Call a digital Sherlock Holmes

Friday, March 10, 2006 (16:49:02)
When the CEO of a small San Diego publishing company started receiving threatening e-mails from an anonymous address, he had a pretty good idea that someone in the company's IT department was involved. The CEO called his lawyers, who in turn called Peter Garza, a computer forensics expert and founder of EvidentData, an investigative firm in Rancho Cucamonga, Calif...

More (CNNMoney.com)
  • Posted by: jamie
  • Topic: News
  • Score: 4 / 5
  • (442 reads)

New data deletion software for consumers

Tuesday, March 07, 2006 (16:11:17)
Software that its developers claim will completely eliminate sensitive data from hard drives has been developed by Nova Development. Drive Erase Pro is targeted at people who want to ensure a hard drive or memory card is truly blank before selling, donating or scrapping the PC into which it is fitted...

More (computeractive)
  • Posted by: jamie
  • Topic: News
  • Score: 0 / 5
  • (2595 reads)

Special agent uses teen talk and computer forensics

Monday, March 06, 2006 (13:44:20)
Most weekdays, and some weekends and nights, find Special Agent James May sitting in front of a PC in his Detroit office, waiting for some cyberjohn to hit on him. Well, not him exactly, but one of his many teenage girl personas. Helping him on the technical side of his job are more than 800 classroom hours in computer forensics and Internet crimes. He's also a certified computer forensic examiner by Eastern Michigan University, where he teaches a computer crimes course...

More (LSJ.com)
  • Posted by: jamie
  • Topic: News
  • Score: 3 / 5
  • (1121 reads)

Chasing cyber-crime, one byte at a time

Friday, March 03, 2006 (20:29:24)
Tom Heflin is the resident surveillance technician and computer forensics expert for the Augusta County Sheriff's office, the department's first line of defense against computer-based crimes. His primary job: Cracking open hard drives and electronic media seized by deputies to find the nearly invisible cyber-crimes locked inside...

More (The News Leader)
  • Posted by: jamie
  • Topic: News
  • Score: 0 / 5
  • (879 reads)