computer forensics
Becoming a computer forensic examiner
Since the advent of affordable personal computers, digital devices, and later the Internet, these technologies have been used for both legal and illegal purposes, and in order …
Judge orders porn suspect to decrypt his hard drives
After having first decided against forcing a suspect to decrypt a number of hard drives that were believed to be his and to contain child pornography, a U.S. judge has changed …
Addonics releases CipherUSB family of hardware encryption solutions
Addonics Technologies announced a family of USB hardware encryption solutions that protect data stored on hard drives, removable drives, flash media, optical media or in the …
Find TrueCrypt and BitLocker encrypted containers and images
Passware announced that Passware Kit Forensic 12.5 can now recognize hard disk images and containers, such as TrueCrypt, BitLocker, PGP, during a computer scan. For a computer …
Computer forensic examiners are from Mars, attorneys are from Venus
The outcome of high stakes investigations and litigation can often depend on the evidence uncovered through computer forensic investigation. That fact highlights the critical …
China-based hackers infiltrated New York Times’ network
The New York Times’ computer systems and network has been breached and its journalists’ private computers and email correspondence spied on for a period of four …
Forensic access to encrypted BitLocker, PGP and TrueCrypt containers
ElcomSoft released Elcomsoft Forensic Disk Decryptor, a forensic tool providing access to information stored in disks and volumes encrypted with BitLocker, PGP and TrueCrypt. …
RSA opens anti-fraud center at Purdue University
RSA, the security division of EMC, announced the opening of a new RSA Anti Fraud Command Center (AFCC) in collaboration with Purdue University. The RSA AFCC is a 24×7 …
Guidance Software unveils fast forensic bridge
Guidance Software announced the Tableau T35u USB 3.0 forensic SATA/IDE bridge for forensic imaging in both lab and field environments. The T35u supports write-blocked, …
Record privileged sessions in Password Manager Pro
ManageEngine announced the immediate session recording capabilities in its privileged password management software, Password Manager Pro. Now, privileged sessions launched …
Malware Forensics Field Guide for Windows Systems
If you are looking for a field guide that will help you identify malware on a Windows computer system, examine it, and determine its impact, than this book might be just the …
Limited seats remain for SANS Forensics Summit in Prague
Organisers have made a “last call” for attendees to register for SANS first dedicated Digital Forensics event in Prague this October. The weeklong event begins on …