Expansion imminent for computer forensics at Bloomsburg University (US)

Governor Rendell recently announced that Bloomsburg University will receive two state grants: a $200,000 grant to support the Greater Susquehanna Keystone Innovation Zone and a $63,000 grant to support the Pennsylvania Center for computer forensics research… More (Standard-Journal online)… Read more

Finding fraud in digital images (podcast)

Associate professor of computer science Hany Farid is interested in detecting whether a digital image has been manipulated. Because digital images are found everywhere today, he explains that his research can be used to examine images to see if they… Read more

CERT’s Virtual Training Environment (VTE) Open to Public

CERT’s Virtual Training Environment (VTE), with more than 160 hours of multimedia-based instruction in information assurance and computer forensics, is now available to the public. The Virtual Training Environment (VTE) is a Web-based knowledge library for Information Assurance, computer forensics… Read more

Tracing An Email

The purpose of this guide is to show the process involved in tracing an email. The first step required to tracing an email is finding out the headers of the email. What are headers? Email headers are lines added at… Read more

New computer forensics lab cracks down on identity theft

Pierce County is attacking identity theft with new technology and vigor that could warn potential victims sooner and lock up crooks longer. Investigators from the prosecutor’s office and sheriff’s department have opened a computer forensics lab that allows them to… Read more

Defense lab accredited in computer forensics

After years of work, the Defense Computer Forensics Laboratory—part of the DOD Cyber Crime Center (DC3)—has been accredited by the American Society of Crime Laboratory Directors/Laboratory Accreditation Board. Ralph Keaton, executive director of ASCLD/LAB, presented the certificate of accreditation to… Read more

Gov’t Cyber-sleuths Focusing on Linux, iPod, Xbox

Cyber-security and computer experts from the government and law enforcement are increasingly concerned with malicious code that runs on Linux and Apple Computer Inc.’s Mac OS X operating systems and threats posed by devices such as iPods and Xboxes. Intensive… Read more

FTC launches site to fight cybercrime

Responding to the rising cybercrime threat, the Federal Trade Commission on Tuesday unveiled an online tool designed to help consumers avoid becoming victims of Internet scams. At the website, www.onguardonline.gov, consumers can take interactive quizzes designed to enlighten them about… Read more

Undelete those deleted emails, FOIA ruling tells UK Government

‘Deleted’ Government records needn’t necessarily be treated as deleted after all, according to a ruling by the Information Tribunal, which deals with appeals against rulings under the Freedom of Information Act. “The Tribunal understands that information which is held electronically… Read more

2005 FBI Computer Crime Survey

Despite investing in a variety of security technologies, enterprises continue to suffer network attacks at the hands of malware writers and inside operatives, according to an annual FBI report released today. Many security incidents continue to go unreported. The 2005… Read more

West Yorkshire BCS Meeting – January 2006

“Computer Forensics” Tuesday 24 January 2006, 5:45 pm (refreshments) for a 6:30 pm startSpeaker: Russell May BSc(Hons) CITP CEng MBCS EnCE[Guidance Software Inc]Venue: Met Hotel, Leeds.… Read more