Read more about computer forensics
Bookmark and Share
  • New expert-level cyber forensics certification

    10.06.2013

    (ISC)2 has developed a new certification, the Certified Cyber Forensics Professional (CCFPSM), as the first global standard for assessing experienced digital forensics professionals' mastery and professionalism.

  • Becoming a computer forensic examiner

    31.05.2013

    Since the advent of affordable personal computers, digital devices, and later the Internet, these technologies have been used for both legal and illegal purposes, and in order to collect evidence to help prosecute some of the people engaged in the latter, a new science had to be born: digital forensics.

  • Judge orders porn suspect to decrypt his hard drives

    29.05.2013

    After having first decided against forcing a suspect to decrypt a number of hard drives that were believed to be his and to contain child pornography, a U.S.

  • Addonics releases CipherUSB family of hardware encryption solutions

    29.05.2013

    Addonics Technologies announced a family of USB hardware encryption solutions that protect data stored on hard drives, removable drives, flash media, optical media or in the cloud.

  • Find TrueCrypt and BitLocker encrypted containers and images

    21.05.2013

    Passware announced that Passware Kit Forensic 12.5 can now recognize hard disk images and containers, such as TrueCrypt, BitLocker, PGP, during a computer scan.




Spotlight

Whitepaper: Zero Trust approach to network security

Posted on 20 November 2014.  |  Zero Trust is an alternative security model that addresses the shortcomings of failing perimeter-centric strategies by removing the assumption of trust.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Fri, Nov 21st
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //