±Forensic Focus Partners

Become an advertising partner

±Your Account


Username
Password

Forgotten password/username?

Site Members:

New Today: 2 Overall: 33148
New Yesterday: 2 Visitors: 182

±Follow Forensic Focus

Forensic Focus Facebook PageForensic Focus on TwitterForensic Focus LinkedIn GroupForensic Focus YouTube Channel

RSS feeds: News Forums Articles

±Latest Articles

RSS Feed Widget

±Latest Webinars

Page 243

Search on This Topic: News

[ Go to Home | Select a New Topic ]

Version 2.0 of StegAlyzerAS and StegAlyzerSS released

Monday, August 21, 2006 (16:38:41)
Backbone Security's Steganography Analysis and Research Center (SARC) has released version 2.0 of StegAlyzerAS (Steganography Analyzer Artifact Scanner) and StegAlyzerSS (Steganography Analyzer Signature Scanner). The new versions have significant new improvements including the ability to scan images of seized storage media in various formats and an enhanced user interface...
  • Posted by: jamie
  • Topic: News
  • Score: 0 / 5
  • (3259 reads)

NIST’s goal: Keep digital evidence fresh

Sunday, August 20, 2006 (06:12:11)
Scientists at the National Institute of Standards and Technology are known for sweating the nitty-gritty details of dull but vital standards for everything from bulletproof vests to medical measurement devices and IT encryption. And now, agency experts are bringing the same precision to computer forensics, fully aware that the final say lies in the notoriously low-tech realm of the judicial system...

More (GCN)
  • Posted by: jamie
  • Topic: News
  • Score: 0 / 5
  • (889 reads)

Dead disks yield live information

Friday, August 18, 2006 (22:24:36)
Identity thieves are gleaning personal information from scrapped computers...

More (Guardian)
  • Posted by: bjgleas
  • Topic: News
  • Score: 0 / 5
  • (2211 reads)

E-mail first step on trail

Friday, August 18, 2006 (22:23:16)
The investigation that led law enforcement to John Mark Karr can be traced to a single e-mail, sent some four years ago...

More (Rocky Mountain News)

While the FBI's Atlanta spokesman, Stephen Emmett, declined to elaborate on the FBI's role, members of the task force told The Atlanta Journal-Constitution for a recent article that a major focus of their work uses sophisticated computer tools and old-fashioned investigative skills to track the movement of CP and predators across the Internet...

More (ajc.com)
  • Posted by: bjgleas
  • Topic: News
  • Score: 0 / 5
  • (1525 reads)

Computers play large role in solving cases

Thursday, August 17, 2006 (16:22:21)
Computers can contain a wealth of evidence, making them valuable resources for law enforcement, government officials, private companies and the like. That's even if the user thinks incriminating files have been deleted, or if nothing on the hard drive is related to the crime itself. "Sixty to 80 percent of all crimes involve computers to some degree," said Brian Carrier, an organizer of the three-day Digital Forensic Research Workshop hosted this week by Purdue University. "More and more crimes are involving computers..."

More (Journal & Courier)

Cost of computer crime in NZ

Thursday, August 17, 2006 (16:19:44)
New Zealand organisations spend on average about half a million dollars annually fighting computer crime within their organisations, according to a new University of Otago survey...

More (Scoop)

WinHex & X-Ways Forensics 13.2 released

Wednesday, August 16, 2006 (16:52:40)
WHAT'S NEW IN V13.2?

* There are new (optional) quick filter buttons in the directory browser column headers that allow to activate and modify dynamic filter settings more instantly.

* The indexing algorithm was revised. The index files are now considerably smaller and certain worst case data will no longer cause the algorithm to almost freeze. The index file format has changed, so existing indexes created by earlier versions cannot be reused.

Cybercrime Treaty: Effective Law Enforcement?

Wednesday, August 16, 2006 (16:38:44)
The U.S. Senate recently approved an international treaty designed to combat computer crime. The treaty has been touted by Senate leaders as enhancing the U.S. ability to cooperate with foreign governments in fighting terrorism, computer hacking, money laundering and child pornography, among other crimes. However, a detailed review of the treaty reveals that it is largely symbolic, because U.S. law already includes much of what the treaty requires...

More (WRAL)

UK police decryption powers 'flawed'

Wednesday, August 16, 2006 (07:27:00)
The government faces criticism over plans to give police powers to make suspects produce readable copies of encrypted computer evidence.The police say the powers are needed because criminals are increasingly using encryption to hide evidence. They estimate that currently there are 30 cases in which encrypted evidence had stumped investigators. But some peers, academics and cryptographers say the plans are flawed and risk being abused...

More (BBC)
  • Posted by: jamie
  • Topic: News
  • Score: 0 / 5
  • (863 reads)

An introduction to Computer Forensics

Tuesday, August 15, 2006 (22:18:01)
E-business is, by definition, technology-dependent. With the increased use of technology it is often assumed that failures are directly related to IT. In actual fact, a significant number of failures or incidents are the result of unauthorised acts by employees or some third party. E-business needs to be equipped to handle the exposure to “digital” risks, and to manage, enquire and record all qualifying incidents. It is critical that businesses adopt a proactive strategy towards the acquisition of digital data, or Computer Forensics...

More (The Star Online)