Tag: forensics

Forensics experts mull a future without signatures 
By Andrew Colley | Jul 31, 2014 | Comment Now 
Look to new means of proving fraud in a digital, mobile world.
 
Analysis: Corporate data open to Customs probes 
By Brett Winterford | Sep 2, 2013 | Comment Now 
Customs officers can arbitrarily search digital devices on a whim.
 
A better way to find crucial digital evidence 
By Eddie Sheehy | Jul 25, 2013 | Comment Now 
Content-based forensic triage.
 
Video: The gems of electronic evidence 
By Darren Pauli | Jun 14, 2013 | Comment Now 
Jump lists, USB registry analysis, super timelines and wireless geolocation.
 
Web browser flaw puts Aussie bank customers at risk 
By Darren Pauli | May 31, 2013 | Comment Now 
Sensitive credentials stored in memory.
 
Memory gaffe leaves Aussie bank accounts open to theft 
By Darren Pauli | May 31, 2013 | Comment Now 
Clear text credentials stored in memory.
 
Google Vault saves every Gmail draft you've ever written 
By Darren Pauli | May 30, 2013 | Comment Now 
Forensics pros get access without passwords.
 
Aussie software ferrets out hidden money 
By Juha Saarinen | Apr 5, 2013 | Comment Now 
The world's richest named and shamed in tax haven data dump.
 
Dementia bluffs live memory analysis  
 
Commercial tool nabs BitLocker, Truecrypt passwords 
 
Defence researchers create open source forensics tool  
By Darren Pauli | Dec 12, 2012 | Comment Now 
Agency reveals it is more than a spook outfit.
 
DSD releases resilient open source forensics tool  
By Darren Pauli | Dec 10, 2012 | Comment Now 
Agency reveals it is more than a spook outfit.
 
Finding the smoking gun in a mountain of digital evidence 
By Eddie Sheehy | Aug 21, 2012 | Comment Now 
Traditional forensic approaches won't cut it.
 
Data breach costs LinkedIn up to $1 million 
By Marcos Colon | Aug 6, 2012 | Comment Now 
LinkedIn's 2Q earnings call reveals that the company spent between $500,000 to $1 million on forensic work surrounding a recent data compromise.
 
Websense launches CSI forensics services 
By Dan Raywood | Jul 30, 2012 | Comment Now 
Pitched to help offs under attack
 
British police extract data from suspect phones 
By Dan Raywood | May 21, 2012 | Comment Now 
Call history, texts and contacts pulled from prisoners.
 
Rackspace resolves 'dirty disk' vulnerability 
Apr 27, 2012 | Comment Now 
Weak implementations allow dirty data to be tapped.
 
Holes found in Rackspace, VPS.Net cloud services 
By SC Staff | Apr 26, 2012 | Comment Now 
Weak implementations allow dirty data to be tapped.
 
Splunk updates Enterprise Security product 
By SC Staff | Feb 12, 2012 | Comment Now 
Launches version 2.0
 
Data breach priorities in the US 
By Ozzie Fonseca | Jan 20, 2012 | Comment Now 
If the breach is bad enough, US organisations must report it to authorities.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Who do you trust most to protect your private data?







   |   View results
Your bank
  39%
 
Your insurance company
  4%
 
A technology company (Google, Facebook et al)
  8%
 
Your telco, ISP or utility
  8%
 
A retailer (Coles, Woolworths et al)
  3%
 
A Federal Government agency (ATO, Centrelink etc)
  19%
 
An Australian law enforcement agency (AFP, ASIO et al)
  14%
 
A State Government agency (Health dept, etc)
  6%
TOTAL VOTES: 1849

Vote
Do you support the abolition of the Office of the Information Commissioner?