Please turn on your JavaScript for this page to function normally.
Becoming a computer forensic examiner

Since the advent of affordable personal computers, digital devices, and later the Internet, these technologies have been used for both legal and illegal purposes, and in order …

Judge orders porn suspect to decrypt his hard drives

After having first decided against forcing a suspect to decrypt a number of hard drives that were believed to be his and to contain child pornography, a U.S. judge has changed …

Addonics releases CipherUSB family of hardware encryption solutions

Addonics Technologies announced a family of USB hardware encryption solutions that protect data stored on hard drives, removable drives, flash media, optical media or in the …

Find TrueCrypt and BitLocker encrypted containers and images

Passware announced that Passware Kit Forensic 12.5 can now recognize hard disk images and containers, such as TrueCrypt, BitLocker, PGP, during a computer scan. For a computer …

Computer forensic examiners are from Mars, attorneys are from Venus

The outcome of high stakes investigations and litigation can often depend on the evidence uncovered through computer forensic investigation. That fact highlights the critical …

China-based hackers infiltrated New York Times’ network

The New York Times’ computer systems and network has been breached and its journalists’ private computers and email correspondence spied on for a period of four …

Forensic access to encrypted BitLocker, PGP and TrueCrypt containers

ElcomSoft released Elcomsoft Forensic Disk Decryptor, a forensic tool providing access to information stored in disks and volumes encrypted with BitLocker, PGP and TrueCrypt. …

RSA opens anti-fraud center at Purdue University

RSA, the security division of EMC, announced the opening of a new RSA Anti Fraud Command Center (AFCC) in collaboration with Purdue University. The RSA AFCC is a 24×7 …

Guidance Software unveils fast forensic bridge

Guidance Software announced the Tableau T35u USB 3.0 forensic SATA/IDE bridge for forensic imaging in both lab and field environments. The T35u supports write-blocked, …

Record privileged sessions in Password Manager Pro

ManageEngine announced the immediate session recording capabilities in its privileged password management software, Password Manager Pro. Now, privileged sessions launched …

Malware Forensics Field Guide for Windows Systems

If you are looking for a field guide that will help you identify malware on a Windows computer system, examine it, and determine its impact, than this book might be just the …

Limited seats remain for SANS Forensics Summit in Prague

Organisers have made a “last call” for attendees to register for SANS first dedicated Digital Forensics event in Prague this October. The weeklong event begins on …

Don't miss

Cybersecurity news