SANS Institute has posted the 2010 Washington DC DF & IR Summit dates.
Dates:
Summit Dates: July 8 - 9, 2010
Post Summit Course Dates: July 10 - 15, 2010
Summit Venue:
Fairmont Washington DC
2401 M Street, NW
Washington, DC 20037
Phone: (202) 429-2400
Fax: (202) 457-5010
Website: Fairmont Hotel Web Site
https://www.sans.org/forensics-incident-response-summit-2010/agenda.php
A blog portal for the digital forensic examiner and computer crime investigator.
Thursday, May 20, 2010
Monday, February 8, 2010
Internet Evidence Finder (IEF): interview with Jad Saliba of JADSoftware.com
Editor’s note: Brad Garnett recently had an opportunity to interview Jad Saliba, of JADSoftware about how he got started in computer forensics and about some of his company’s products. Please note that JADSoftware has offered a discount to readers, see the details below.
Q: You have developed several software tools that can assist computer forensic professionals during the analysis phase of a forensic exam. Tools like Internet Evidence Finder (IEF), FChat (FCT), Encrypted Disk Detector (EDD), and Facebook® JPG Finder (FJF) are all great for the forensic examiner’s toolkit. We are going to focus on IEF. Explain how IEF is used during media analysis and its capabilities/limitations.
Labels:
computer forensics,
forensic tools,
interviews
Thursday, January 7, 2010
GIAC Adds GCFA to The List of ANSI/ISO/IEC 17024 Accredited Credentials
BETHESDA, Md., Jan. 7 /PRNewswire/ -- The Global Information Assurance Certification (GIAC) program, a SANS Institute affiliate, announced today that the GIAC Certified Forensics Analyst (GCFA), GIAC Certified Intrusion Analyst (GCIA) and GIAC Certified Incident Handler (GCIH) have been accredited under the ANSI/ISO/IEC 17024 Personnel Certification program. GIAC is leading the way in the information security industry with five ANSI accredited credentials
Labels:
computer forensics,
GCFA,
news
Monday, September 8, 2008
What is computer forensics?
Computer forensics (also known as digital forensics) is the practice of identifying, seizing, analyzing, and reporting computer/digital evidence including, but not limited to hard drives, removable storage devices and media, PDAs, cell phones, etc. The process follows stringent protocol to adhere to the evidentiary rule in a court of law.
Reference: http://en.wikipedia.org/wiki/Computer_forensics
Reference: http://en.wikipedia.org/wiki/Computer_forensics
Labels:
computer forensics,
General
Smishing (Cell Phone Scam)
A new scam involving cell phones has emerged. Identity thieves have long used "phishing" in e-mails to obtain personal and financial information from victims. This new scams involves SMS (Short Message Service) called "smishing". A potential victim receives a text message to their cell phone posing as a financial institution stating that their account has been compromised and links them to a fraudulent website where the thief again try to gain access to the account numbers.
If you receive a phone call asking you to verify your personal information hang up immediately. Legitimate financial institutions will never do this.
If you did not initiate the contact hang up or delete the message immediately.
Report suspicious emails, text messages, or phone calls the to the Federal Trade Commission at www.ftc.gov or by calling 1-877-IDTHEFT
If you receive a phone call asking you to verify your personal information hang up immediately. Legitimate financial institutions will never do this.
If you did not initiate the contact hang up or delete the message immediately.
Report suspicious emails, text messages, or phone calls the to the Federal Trade Commission at www.ftc.gov or by calling 1-877-IDTHEFT
Labels:
cell forensics
Subscribe to:
Comments (Atom)