±Forensic Focus Partners

Become an advertising partner

±Your Account


Username
Password

Forgotten password/username?

Site Members:

New Today: 0 Overall: 33043
New Yesterday: 2 Visitors: 138

±Follow Forensic Focus

Forensic Focus Facebook PageForensic Focus on TwitterForensic Focus LinkedIn GroupForensic Focus YouTube Channel

RSS feeds: News Forums Articles

±Latest Articles

RSS Feed Widget

±Latest Webinars

Page 286

Data Recovery: What to do when back-ups break down

Friday, April 22, 2005 (11:39:31)
Businesses are so reliant on their data that only the very naive do not make regular back-ups. And if lack of business sense prevents some companies from running sensible housekeeping routines, new and stringent legislation now requires businesses to keep data available for the purpose of audit trails and data protection compliance. Traditionally, back-up and data archives were the preserve of the finance director, who needed a record of data to complete year-end figures for the Inland Revenue. However, post-Enron and WorldCom, corporate governance has extended to keeping an audit trail of all transactions for regulated industries, and to maintaining records of business-critical documents for others...

More (ComputerWeekly.com)

Leave it to the expert

Thursday, April 21, 2005 (11:23:29)
Cyber crime investigation is not merely one of finding out how a computer system was hacked. It is sometimes also about how a system has been used to facilitate a conventional crime, such as a homicide or an extortion. There are any number of criminal investigations these days that call for an analysis of e-mail traffic between members of a criminal gang or between an aggressor and a victim...

More (The Hindu Business Line)

Messages Can Reveal Sender’s Real Agenda

Wednesday, April 20, 2005 (20:22:39)
E-mails are becoming a major part of investigative trails, whether they involve criminal activity, civil lawsuits, regulatory examinations or internal malfeasance within a company. Often more conversational and informal than paper documents, they can reveal the intent or motive of an individual under investigation – providing a critical piece of evidence needed to prove a crime was committed. They are routinely requested in lawsuits, particularly those filed by the Securities and Exchange Commission and other regulatory agencies. They also may be part of a company’s internal investigation into sexual harassment and other claims. Yet many executives and employees continue to use e-mails freely and carelessly, often unaware of how devastating they could be...

More (LA Business Journal)

Interview with Brian Carrier, author of “File System Forensic Analysis"

Tuesday, April 19, 2005 (10:02:20)
Brian Carrier specializes in digital forensics and is the writer and maintainer of The Sleuth Kit and Autopsy, which are open source forensics tools. In this interview with IT-Observer he discusses digital forensics topics as well as his book...

More (IT Observer)

Approaches, Trends and the Real Market Definition for Log Management

Monday, April 18, 2005 (17:40:48)
SANS will present the following webcast on Tuesday, April 26 at 4:00 PM EDT (2000 UTC)

Featuring: Stephen Northcutt and Dominique Levin Sponsored by: LogLogic

Stephen Northcutt will share his analysis of the growing importance of proper log management, including real-world issues facing the IT community around best practices of log management, traditional approaches vs. new high-performance commercial solutions and the capturing of all log data messages including informational-levels. Northcutt will also address log management as a separate market, identify and define the market size, market segmentation, market drivers, as well as differentiate Log Management from other markets such as Network Performance and Availability Management or Security Management.

https://www.sans.org/webcasts/show.php?webcastid=90585

Cyber Forsensics…Still a Way to Go

Monday, April 18, 2005 (17:20:14)
Purdue’s Spafford is worried about the ad hoc nature of cyber forensics today. "I am concerned that we develop a more scientific and rigorous approach so that we may have confidence in the results,” he stressed. "It is unfortunate if we are unable to prosecute a criminal because we are unsure of our analysis; it is a greater tragedy if we wrongly accuse an innocent person of malfeasance because we have not appropriately gathered and analyzed the evidence.”

More (SAP Info)

5th Annual Digital Forensics Research Workshop

Sunday, April 17, 2005 (23:23:57)
The 5th Annual Digital Forensics Research Workshop (DFRWS 2005) has been added to the events page.

New forum for those looking to get started in computer forensics

Saturday, April 16, 2005 (23:49:46)
A new forum for those looking for advice on how to get started in the computer forensics industry has been created and can be found here.

Will members please make sure that this forum is the only one used for enquiries of this nature, thank you.

Detectives Tainted Hard Drive, Expert Claims

Friday, April 15, 2005 (10:44:52)
BENTONVILLE, USA -- Evidence on the hard drive of a murdered man's computer was damaged after police seized the machine, a computer forensics expert testified Thursday. After Howard was murdered in September 1999, police used information from his hard drive to discover whom he spoke to and where he went the last days of his life. Tim Hanners, the manager of computer investigation for Vogon International, a private company in Norman, Okla., providing data recovery services, testified late Thursday about the tainted data...

More (The Morning News)

New Paper: Is There a Need for Industry Control?

Thursday, April 14, 2005 (18:02:55)
A very thought provoking article from Nick Furneaux of CSITech entitled "Is There a Need for Industry Control?" has been added to our Papers & Articles page and can also be viewed directly here.