Thursday, April 26, 2007

eDiscovery Law Review

clipped from www.cmswire.com

The problem is the fluid nature of electronic information and the relative naivety of many of those who must manage the email compliance issue. This is where JOLT steps in.

Once a year, JOLT publishes an issue dedicated solely to emerging matters in eDiscovery. The most current volume covers the December rule changes and contains the following six resources:

 powered by clipmarksblog it

Tuesday, April 24, 2007

Web threats to surpass e-mail pests

clipped from news.zdnet.com


The Web threat hasn't gone unnoticed by the security industry, but securing Web traffic for corporate users has primarily been the terrain of specialized companies such as Websense, Surf Control and ScanSafe. All these companies offer products or services to block known malicious sites or scan Web traffic.


"The big guys, including ourselves, have not been able to keep up with the hackers. The threat landscape changes so fast," Chen said. Trend Micro is the third-biggest antivirus company in the world, after Symantec and McAfee.

 powered by clipmarksblog it

Monday, April 23, 2007

Cyberspies exploit Microsoft Office

clipped from www.usatoday.com
SEATTLE — Cyberspies have a new secret weapon: tainted Microsoft Office files.

A rising number of cyberattacks are taking aim at specific individuals at critical government agencies and corporations — enticing them to unwittingly open a corrupted Word, Excel or PowerPoint file sent as an e-mail attachment.

 powered by clipmarksblog it

Friday, April 20, 2007

Forensics and eDiscovery explosion

clipped from www.law.com

Ball emphasizes that forensics is too important and complicated to be a part-time job for an IT person.


  • A record of published work;

  • Respect from peers;

  • Considerable court experience;

  • Report-writing skills; and

  • Extensive focus on the discipline.

Ball recommends looking for a computer-forensics expert that provides formal training and meaningful certification -- something with substantial components of practice examination, peer review and experience, like CCE (certified computer examiner) or EnCe (EnCase certified examiner). He also suggests that your expert have:

The electronic-discovery phenomenon is here to stay -- and the industry is still exploding.

 powered by clipmarksblog it

Eight in ten major Web sites highly vulnerable to attack

lots of people need help

April 19, 2007 (PC World) -- Eight out of ten Web sites contain common flaws that can allow attackers to steal customer data, create phishing exploits, or craft a variety of other attacks, a security company reported today.

WhiteHat Security regularly scans hundreds of "very popular, very high-traffic sites" for its online business customers, says Jeremiah Grossman, the company's founder. "More than likely, you have shopped there, or bank there," he says. Thirty percent of scanned sites contain an urgent vulnerability, such as one that allows direct access to a company database with customer information, he says.

 powered by clipmarksblog it

Thursday, April 19, 2007

Software that runs home routers, cell phones and personal digital assistants is rife with security bugs

clipped from news.zdnet.com
VANCOUVER, B.C.--Software that runs home routers, cell phones and personal digital assistants is rife with security bugs, an expert said Thursday.


Barnaby Jack, a Juniper Networks security researcher, gave a tutorial at the CanSecWest conference here on how bug hunters can find exploitable vulnerabilities in such devices and demonstrated an attack on a D-Link router using a yet-to-be-patched hole.

 powered by clipmarksblog it

EnCase Forensic Review

Of the straight (i.e., not over-the-network) computer forensic tools we examined, EnCase has made the most noticeable changes since last year. However, a few changes simply are cosmetic. That said, we liked EnCase better this year than last for one important reason: it has kept pace well with the needs of users.There are some familiar things missing in this release. For example, the DOS version no longer is supported, but imaging a computer can now use a Linux boot disk that you must create by downloading a Linux distribution and creating a bootable CD.
 powered by clipmarksblog it

AccessData FTK review

AccessData is one of the venerable developers of computer forensic software. The company’s biggest strength is that it is — and has been since its inception — the go-to supplier of password recovery tools. AccessData has packaged its complete tool set in one product called the Ultimate Toolkit. In addition to the Forensic Tool Kit, referred to by forensic analysts simply as FTK, the Ultimate Toolkit contains the full suite of password recovery tools, drive and media wipers, a registry viewer and other useful products.
 powered by clipmarksblog it

Monday, April 16, 2007

Texas Investigative Licensing Requirements


Sec. 1702.104. INVESTIGATIONS COMPANY. A person acts as an investigations
company for the purposes of this chapter if the person:

(1) engages in the business of obtaining or furnishing, or accepts employment
to obtain or furnish, information related to:

(2) engages in the business of securing, or accepts employment to secure,
evidence for use before a court, board, officer, or investigating committee;

powered by clipmarksblog it

Friday, April 13, 2007

Black hatters do, gray hatters are stopped

Old adage of "if you outlaw the guns only outlaws will have them" applies
clipped from news.zdnet.com
Security holes in online applications may go unfixed because well-intended hackers are afraid to report bugs.


Web applications pose a dilemma for bug hunters: how to test the security without going to jail? If hackers probe traditional software such as Windows or Word, they can do so on their own PCs. That isn't true for Web applications, which run on servers operated by others. Testing the security there is likely illegal and could lead to prosecution.

 powered by clipmarksblog it

Thursday, April 12, 2007

WEP cracked in 3 sec

April 12, 2007 (Computerworld Australia) -- SYDNEY - Australian IT security managers have vowed they would never rely on the Wired Equivalent Privacy (WEP) protocol especially after the release of new research this week showing it can be cracked in as little as three seconds.

powered by clipmarksblog it

CCE

another worthwhile certification
 powered by clipmarksblog it

Wednesday, April 11, 2007

Reconnaissance

Reference list

http://all-nettools.com
http://www.tamos.com/products/smartwhois/
http://www.dnsstuff.com/
http://samspade.org/

Find stuff about people

from CEH QUE Book
clipped from zabasearch.com

ZABASEARCH
The #1 Free People Search and Public Information Search Engine

 powered by clipmarksblog it