Read more about computer forensics
Bookmark and Share
  • SANS revamps its Memory Analysis Course

    02.05.2014

    To provide digital forensic and incident response professionals with a more exact and efficient way to investigate advanced attacks, SANS Institute today announced a complete revamp of its SANS FOR526: Memory Analysis In-Depth course.

  • Breaking the backlog of digital forensic evidence

    23.12.2013

    It is time for a change in the way the law enforcement works with digital forensic evidence.

  • Unified Communications Forensics

    21.11.2013

    Authors: Nicholas Grant and Joseph Shaw Pages: 156 Publisher: Syngress ISBN: 1597499927 Introduction “Unified Communications is the integration of real-time communication services such as instant messaging, presence information, telephony (including IP telephony), video conferencing, data sharing, call control and speech recognition with non-real-time communication services such as unified messaging (integrated voicemail, e-mail, SMS and fax),” Wikipedia explains.

  • Innovation, big data and the future of information security

    02.10.2013

    Dr. Herbert (Hugh) Thompson is Program Chair for RSA Conferences and a world-renowned expert on IT security.

  • Placing the Suspect Behind the Keyboard

    05.09.2013

    Author: Brett Shavers Pages: 320 Publisher: Syngress ISBN: 1597499854 Introduction There are many books addressing the subject of computer forensics out there, but this tome is one of the rare ones that approaches cybercrime investigations in a holistic manner, i.e.




Spotlight

Email scammers stole $215M from businesses in 14 months

Posted on 29 January 2015.  |  In 14 months there have been nearly 1200 US and a little over 900 non-US victims of BEC scams, and the total money loss reached nearly $215 million.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  
DON'T
MISS

Fri, Jan 30th
    COPYRIGHT 1998-2015 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //