Thursday, May 20, 2010

The 2010 Digital Forensics and Incident Response Summit

SANS Institute has posted the 2010 Washington DC DF & IR Summit dates.

Dates:
Summit Dates: July 8 - 9, 2010
Post Summit Course Dates: July 10 - 15, 2010
Summit Venue:
Fairmont Washington DC
2401 M Street, NW
Washington, DC 20037
Phone: (202) 429-2400
Fax: (202) 457-5010
Website: Fairmont Hotel Web Site

https://www.sans.org/forensics-incident-response-summit-2010/agenda.php

Monday, February 8, 2010

Internet Evidence Finder (IEF): interview with Jad Saliba of JADSoftware.com

Editor’s note: Brad Garnett recently had an opportunity to interview Jad Saliba, of JADSoftware about how he got started in computer forensics and about some of his company’s products. Please note that JADSoftware has offered a discount to readers, see the details below.

Q: You have developed several software tools that can assist computer forensic professionals during the analysis phase of a forensic exam. Tools like Internet Evidence Finder (IEF), FChat (FCT), Encrypted Disk Detector (EDD), and Facebook® JPG Finder (FJF) are all great for the forensic examiner’s toolkit. We are going to focus on IEF. Explain how IEF is used during media analysis and its capabilities/limitations.



Thursday, January 7, 2010

GIAC Adds GCFA to The List of ANSI/ISO/IEC 17024 Accredited Credentials

BETHESDA, Md., Jan. 7 /PRNewswire/ -- The Global Information Assurance Certification (GIAC) program, a SANS Institute affiliate, announced today that the GIAC Certified Forensics Analyst (GCFA), GIAC Certified Intrusion Analyst (GCIA) and GIAC Certified Incident Handler (GCIH) have been accredited under the ANSI/ISO/IEC 17024 Personnel Certification program. GIAC is leading the way in the information security industry with five ANSI accredited credentials

Monday, September 8, 2008

What is computer forensics?

Computer forensics (also known as digital forensics) is the practice of identifying, seizing, analyzing, and reporting computer/digital evidence including, but not limited to hard drives, removable storage devices and media, PDAs, cell phones, etc. The process follows stringent protocol to adhere to the evidentiary rule in a court of law.

Reference: http://en.wikipedia.org/wiki/Computer_forensics

Smishing (Cell Phone Scam)

A new scam involving cell phones has emerged. Identity thieves have long used "phishing" in e-mails to obtain personal and financial information from victims. This new scams involves SMS (Short Message Service) called "smishing". A potential victim receives a text message to their cell phone posing as a financial institution stating that their account has been compromised and links them to a fraudulent website where the thief again try to gain access to the account numbers.

If you receive a phone call asking you to verify your personal information hang up immediately. Legitimate financial institutions will never do this.

If you did not initiate the contact hang up or delete the message immediately.

Report suspicious emails, text messages, or phone calls the to the Federal Trade Commission at www.ftc.gov or by calling 1-877-IDTHEFT