Vermont's Champlain College
George Washington Univ
Computer Forensics Tool Testing Web Site
High Technology Crime Investigation ASsociation (HTCIA)
International Association of Computer Investigative Specialists (IACIS)
11/13/2007 - The verb "hack" did not start out as a pejorative. In its original sense, it simply meant pushing a piece of hardware or software beyond its intended capabilities, to make it do something it was not designed to do.A personal blog by Ed Felten, a Princeton University computer science professor, called Freedom to Tinker, explores this controversial intersection in regular missives ranging from the use of P2P to what he terms "the weird Orwellian language" of digital-rights-management vendors. Felten's blog is this month's A Site to See.
11/13/2007 - If you had no problem understanding that headline (it decodes as "see you later, dude"), you're one of those initiated into the world of instant messaging (IM). And you're a potential source of threats to the corporate network if you use IM at work. But IT personnel now have some new resources to help mitigate threats to the network created by IM or peer-to-peer (P2P) communications. One is a Web site of current threat and vulnerability information sponsored by FaceTime Communications, a provider of tools that secure IM and P2P networks. The information on the Web site comes from the FaceTime Instant Response Security Team (FIRST), which is a group of security pros dedicated to collecting information on new threats and vulnerabilities and then finding ways to mitigate these. Another resource is the IMLogic Threat Center, created by IMLogic, which makes software products that help enterprises manage corporate IM usage. Like FIRST, the Threat Center offers a knowledge base of IM and P2P viruses and worms, and has partnerships with IM vendors and antivirus companies. Much of this knowledge base comes from a honeypot infrastructure designed to catch IM and P2P threats.
11/09/2007 - Telecommuters who regularly communicate proprietary data via mobile devices aren’t a security threat, say most government security officers. Many seem confident that, with adequate resources, they can keep mobile devices secure.
11/08/2007 - Spam is no longer a nuisance. It has developed into a huge problem for organizations that have to deal with the millions of e-mails that flood their mailboxes, often delivering scams or viruses.