This week in Case Leads Bug fixes for Chrome Browser and MD5Deep. A few new tools from JadSoft and Black Bag Technologies. Some great reads about IE RecoveryStore and Travel Log, Becoming a CSI without the blood and a 2012 Security report. Android malware strikes phones in China and an IT guy shoots his daughters laptop.
If you have an item you'd like to contribute to Digital Forensics CaseLeads, please send it to email@example.com.
- Jesse Kornblum posted critical bug fixes for MD5Deep, you can read about it here, and download the fixes here.
- JADsoftware Inc. announces the availability of IEF Triage, a new product for its computer forensics solution, Internet Evidence Finder (IEF).
- BlackBag Technologies, Inc., developer of Mac OS X, iPhone, and iPad forensic software and training solutions, announces the release of MacQuisition 2012.R1, a 3-in-1 live data acquisition, targeted data collection, and forensic imaging tool.
- Yogesh Khatri from Swift Forensics has posted theformat specification for IE's RecoveryStore and Travel Log (Travelog). It can be downloadedhere.
- Want CSI without the blood? Read about it here.
- From Sharon Nelson at "Ride The Lightning" blog, "Law Firm in Marine Massacre Case Suffers Data Breach".
- DFIROnline: Defragmenting the digital forensics community with HTCIA member MikeWilkinson
- TrustWave has released their 2012 Global Security Report. You can download it here.
- New Android malware bags millions in revenues. The total number of infected Android devices connected to the botnet is estimated at hundreds of thousands, with many infected devices able to generate revenue on any given day. Revenue is generated through premium text messaging, phone, and video services, but the malware is limited to the networks of China's two largest mobile carriers.
- Google fixes 20 flaws with latest version of Chrome browser. Google is also handing out bounties to bug hunters for helping to find and plug Chrome flaws.
- In cyber era, militaries scramble for new skills. Militaries around the world are racing to recruit computer specialist, while money is plentiful for new forces of "cyber warriors," attracting often individualistic technical specialists and hackers into military hierarchies is another matter.
- IT guy answers daughter's Facebook rant by shooting her laptop. How many times have we really wanted to do something like this?
- BOFH, The Cloud Committee Calamity.
- SANS Phoenix 2012-Phoenix, Arizona -February 13 - 18, 2012
- RSA Conference 2012-San Francisco, CA -February 26 - 27, 2012
- SANS Secure Singapore 2012-Singapore, Singapore -March 05 - 17, 2012
- Mobile Device Security Summit- Nashville, TN -March 12 - 15, 2012
- 12th Annual CanSecWest Conference-Vancouver, British Columbia, Canada - March 9 - 11, 2012
- SANS 2012-Orlando, Florida -March 23 - 30, 2012
- Euro Forensic 2012-Istanbul, Turkey - March 29 - 31, 2012
- SANS Northern Virginia 2012, Reston, VA - April 15 - 20, 2012 -
- 5th USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET '12) - San Jose, CA - April 24th, 2012
- SANS Cyber Guardian 2012 - Baltimore, MD - April 30 - May 7, 2012
- SANS AppSec 2012: Summit & Training-Las Vegas, NV - April 24 - May 2, 2012
- 7th ACM Symposium on Information, Computer and Communications Security - Seoul, South Korea - May 1 - 3, 2012
- SANS Security West 2012 - San Diego, CA - May 10 - 18, 2012
- 14th Information Hiding Conference - Berleley, CA - May 15 - 18, 2012
- IEEE Symposium on Security & Privacy - San Francisco, CA - May 20 - 23, 2012
- Computer Enterprise and Investigation Conference - Summerlin, NV - May 21 - 24, 2012
- 2012 ADFSL Conference on Digital Forensics, Security and Law - Richmond, VA - May 30 - 31, 2012
Call For Papers:
- 14th Information Hiding Conference- Due Date - Feb 05, 2012
- 5th USENIX Workshop on Large-Scale Exploits and Emergent Threats(LEET '12)- Due Date - Feb 13, 2012
- ARES Conference- Due Date - Mar 01, 2012
- Symposium On Usable Privacy and Security- Due Date - Mar 09, 2012
- European Symposium on Research in Computer Security (ESORICS) 2012- Due Date - Mar 31, 2012
Digital Forensics Case Leads is a (mostly) weekly publication of the week's news and events relating to digital forensics. If you have an item you'd like to share, please send it to firstname.lastname@example.org.
Digital Forensics Case Leads for 20120210 was compiled by Mark McKinnon GCFA, CCE is Principal of RedWolf Computer Forensics where he has written many tools that are used throughout the Computer Forensic Community. You can follow Mark on twitter @markmckinnon.