±Forensic Focus Partners

Become an advertising partner

±Your Account


Username
Password

Forgotten password/username?

Site Members:

New Today: 0 Overall: 32899
New Yesterday: 0 Visitors: 161

±Follow Forensic Focus

Forensic Focus Facebook PageForensic Focus on TwitterForensic Focus LinkedIn GroupForensic Focus YouTube Channel

RSS feeds: News Forums Articles

±Latest Articles

RSS Feed Widget

±Latest Webinars

Page 281

Search on This Topic: News

[ Go to Home | Select a New Topic ]

Web to have 'terror watch' team

Friday, March 18, 2005 (20:21:25)
Five European governments are setting up a hi-tech team to monitor how terrorists and criminals use the net. The group will make recommendations on shutting down websites that break terrorism laws. The plans for the initiative came out of a meeting of the G5 interior ministers in Spain that discussed ways to tackle these threats...

More (BBC)

Live each day like you're going to be hacked

Friday, March 18, 2005 (14:24:18)
Forensics was a word repeated throughout this week's SecureWorld conference. Experts mentioned the media firestorm that has enveloped ChoicePoint and other companies where hackers were able to steal mountains of consumer data that could eventually be used for identity theft and other cybercrimes. The bad news is that every business can be hacked no matter how seriously executives take security, experts said. The good news is that companies can keep their reputations intact by responding the right way to a cyberheist. And that's where forensics is vital. It's all about knowing what not to touch and who to call the moment you think you've been hacked...

More (SearchSecurity.com)

A Method for Forensic Previews

Thursday, March 17, 2005 (15:18:44)
During any computer forensics operation, the state of the target machine must be left as undisturbed as possible. This underlying principle applies to all forensics activities, ranging from the field preview to the full blown examination in a lab. Nevertheless, there remains an important distinction between a preview operation and lab work: by its nature, the preview is very likely to contaminate original evidence...

More (SecurityFocus)

UK Government and industry back IT security professionalism plans

Thursday, March 17, 2005 (10:38:01)
Proposals to create a professional institution that would set minimum standards of professionalism for IT security specialists have won backing from the government and leading businesses. The form the institute will take has yet to be decided. One of the options under consideration is the creation of a new body from the Institute for Communications Arbitration and Forensics, with assistance from the British Computer Society and other IT security bodies...

More (Computer Weekly)

Video Forensics: Catching the Crooks on Camera

Thursday, March 17, 2005 (00:09:35)
Watching movies and your favorite episode of CSI (Crime Scene Investigation), you would think that recorded video is always crystal clear, easily showing a suspect's face or his license plate, but this is far from reality. In fact, the recorded video is often so bad that video forensics investigators have to be brought in. Using special techniques and software, these investigators enhance and reconstruct video to catch the crooks...

More (Tom's Hardware Guide)

Computer sleuths bring crime to light

Wednesday, March 16, 2005 (16:24:14)
When Coreen Kulvich and Meredith Tanner explore hard drives and Zip disks, they're hunting more than just bytes of data. They're looking for convictions. Kulvich, 29, and Tanner, 28, make up the Dakota County Sheriff Department's small but increasingly vital computer forensics team. Launched in 2003, the unit has played a central role investigating some of the county's most sensitive criminal cases...

More (Pioneer Press)

Australian ISP raided for BitTorrent links

Tuesday, March 15, 2005 (11:34:35)
An Australian ISP was raided 10th March under court orders for alleged copyright infringement in the first crackdown on the illicit use of BitTorrent technology. Perth-based ISP People Telecom (formerly known as Swiftel Communications), which is listed on the Australian Stock Exchange, was fronted at 9am by seven music industry piracy investigators, data forensics experts and court appointed solicitors...

More (APC)

Cases confirm computer privacy is illusion

Monday, March 14, 2005 (12:07:32)
Want to communicate your thoughts privately or anonymously? Step away from the computer. Say it with flowers. Or a whisper. Or at least a pen. If you won't do it for yourself, do it for your lawyer -- the one you may need one day because of something stupid or damning or both that you blithely typed into a computer e-mail or document file on the false assumption that it was confidential or untraceable...

More (Wichita Eagle)

Should Undercover Internet Investigations be Publicized in the Media?

Sunday, March 13, 2005 (14:20:15)
Should Undercover Internet Investigations be publicized in the Media?

By Sergeant Frank Kardasz

More (New Criminologist)

Windows Security Log Encyclopedia (Press Release)

Saturday, March 12, 2005 (14:08:19)
IT managers and their staffs now have the Windows Security Log Encyclopedia, a new Windows tool for monitoring, intrusion detection and for carrying out computer forensics. The new tool covers all nine audit categories of Windows Server 2003 and illuminates the subtle, yet critical, differences between Windows Server 2003, 2000, and XP regarding security events. It documents each security event in the Windows OS, complete with analysis and commentary. This tool is freely available online at

http://www.ultimatewindowssecurity.com/encyclopedia.html