An article by Gary Kessler entitled “Steganography: Implications for the Prosecutor and Computer Forensics Examiner” is now online.
The article can be read here.
Technology hit the headlines for the wrong reasons again last week, as a gang of British software pirates who characterised themselves as latter-day Robin Hoods found themselves in jail. The convictions underlined the perception that cybercrime is on the up,
A new article by Setec Investigations entitled “Learning from Other’s Mistakes: Issues Arising from Electronic Discovery” is now online.
The article can be read here.
The Federation Against Software Theft today warns UK company directors that they risk being branded ‘software thieves’ because of the actions of their employees, including those in the IT department. This comes in the wake of The Federation’s launch of
Around 20% of the world’s hijacked computers sending out spam, attacking websites and hosting unsavoury material are in China, says a report. The figures, from security firm Ciphertrust, come amid spiralling rates of internet use in China…
More (BBC)
If you ask Chris Budge, the police are no worse – and may even be a lot better – than any other organisation when it comes to looking at p**n at work. Budge should know. The computer forensic consultant runs
Keith Jones and Curtis Rose have harnessed their technical acumen to write their latest book entitled, “Real Digital Forensics.” The book’s over 500 pages cover the methodology for the collection and analysis of computer forensic data; the approach for compiling
In the field of computer crime, there is one glaring problem: the law. Until relatively recently, there was no law to criminalise what might be recognised as obvious ‘mischiefs’ performed against computers; there was no legal framework to make hacking,
Golden Richard III, a professor of computer science at New Orleans University and a digital forensics expert, has been experimenting with using distributed computing to recover lost computer files. By harnessing the number-crunching power of several computers to work on
Like Hansel and Gretel [Brill explained] people leave crumbs as they wander cyberspace or work on their computer desktops. Following those crumbs, forensic scientists at Kroll have been able to trace Saddam Hussein’s stolen billions; understand the implosion of Enron;
Sept. 11 turned Sung-Ki Lim and Sang Jun from geeks to G-men. Well, they’re still geeks, but instead of pursuing an MBA or traveling far and wide as systems analysts, the two men are putting their technical skills to work
A superb new article by David Sullivan entitled “Job hunting advice for UK computer forensics professionals” is now online at
http://www.forensicfocus.com/computer-forensics-jobs-uk
I am sure our UK members will find it a very worthwhile read!
Jamie
In the ‘if you can’t beat ’em, join ’em stakes’, computer-based crime is driving more and more IT professionals to study the skills and tools needed to unravel and reveal the inner workings of cyber fraudsters. The general upsurge in
Occasionally, you might need to trace a user’s Web-browsing path. Manual forensic analysis, which involves digging through cookie files, the browser’s cache, and browser history data, isn’t easy. For a good rundown on forensic analysis of browser activity, you should
A new article by Andy Dodd entitled "Using areas of the Microsoft Windows registry to mine data for use in Forensic Computing" has been added to the computer forensics papers and articles section.
We are always happy to consider new
We Value Your Privacy
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional
Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional
Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.