AUSTRALIA'S PRIVACY COMMISSIONER TELLS GOOGLE TO DESTROY STREETVIEW PAYLOAD DATA http://www.theregister.co.uk/2012/08/08/google_must_destroy_data/



Similar documents
CHROME 23 INCLUDES DO NOT TRACK OPTION

NATIONWIDE INSURANCE NETWORK BREACH AFFECTS ONE MILLION

TRATTAMENTI DATI PER ATTIVITÀ DI PROPAGANDA ELETTORALE - ESONERO DALL'INFORMATIVA

LA FARNESINA 'BUCATA' DAGLI HACKER

TOR: L'FBI SI INFILTRA E ARRESTA UN PEDOFILO


\\\\\\\\\\\\ DIGITAL FORENSICS ALUMNI //////////// Newsletter 34 - Marzo/Aprile 2014 \\\\\\\\\\\\\\\\\\\\\\\\\/////////////////////////

\\\\\\\\\\\\ DIGITAL FORENSICS ALUMNI //////////// Newsletter 36 - Luglio/Agosto 2014 \\\\\\\\\\\\\\\\\\\\\\\\\/////////////////////////

\\\\\\\\\\\\ DIGITAL FORENSICS ALUMNI //////////// Newsletter 13 - Dicembre 2011 \\\\\\\\\\\\\\\\\\\\\\\\\/////////////////////////

ARRIVA IL PRIMO BANCOMAT BITCOIN IN ITALIA

SENTENZA DELLA CORTE DI CASSAZIONE: L'INVIO DI NON INTEGRA IL REATO DI MOLESTIE EX ART. 66


Intothe Eyeof the Twister 19 Oct2012

Multi-Factor Authentication

Crosscheck Web Services Patent Pending Automated SOA Compliance and Security Assessment

Digital Forensic Techniques

Managing Your Cyber & Data Risk 2010 NTA Convention Montreal, Quebec

Information Security. CS526 Topic 1

Objectives. What is Cloud Computing? Security Problems and Liability Privacy Concerns Solutions Recap Challenges for the Customer

The Incident Response Playbook for Android and ios

CSC E Mail. Mobile Device Configuration Settings and Setup Instructions

FORBIDDEN - Ethical Hacking Workshop Duration

Protect Yourself from Cyber Risks

CryptoLocker la punta dell iceberg, impariamo a difenderci dagli attacchi mirati. Patrick Gada 18 March 2015 Senior Sales Engineer

EC-Council Ethical Hacking and Countermeasures

Protecting your Data, Devices, and Digital Life in a BYOD World: A Security Primer GLENDA ROTVOLD AND SANDY BRAATHEN NBEA APRIL 2, 2015

The Cloud On A Clear Day. Neal Juern

Tutorial on Smartphone Security

2016 Digital Safety Class UNDERSTAND YOUR RISKS AND STAY TOTALLY SECURE JESSE ROBERTSON, TECH 4 LIFE

Christos Douligeris cdoulig at unipi dot gr. Department of Informatics University of Piraeus

Robotics Core School 1

Loophole+ with Ethical Hacking and Penetration Testing

INTERNET ATTACKS AGAINST NUCLEAR POWER PLANTS

Jibran Ilyas DIRECTOR

E U R O P E A N C U R R I C U L U M V I T A E F O R M A T PERSONAL INFORMATION

Belgrade 12 December Luke Brucato Manager CRIF Certification Services

index biometrics 74, 81, 113, 130, 141, 188 blog 154, 157, 177 Index 219

Joint Universities Computer Centre Limited ( JUCC ) Information Security Awareness Training - Session One

Full version is >>> HERE <<<

Overview. Common Internet Threats. Spear Phishing / Whaling. Phishing Sites. Virus: Pentagon Attack. Viruses & Worms

COPIA TRATTA DA GURITEL GAZZETTA UFFICIALE ON-LINE

Ethical Hacking & Cyber Security Workshop

Just EnCase. Presented By Larry Russell CalCPA State Technology Committee May 18, 2012

[WEB HOSTING SECURITY 2014] Crucial Cloud Hosting. Crucial Research

COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM

The Future of Data Breach Risk Management Response and Recovery. The Cybersecurity Forum April 14, 2016

= AUDIO. The Importance of Mobile Device Management in HIT. An Important Reminder. Mission of OFMQ 12/9/2015

Evolving in the global digital scenario. Politecnico di Torino

Computer Hacking Forensic Investigator v8

FRONT RUNNER DIPLOMA PROGRAM INFORMATION SECURITY Detailed Course Curriculum Course Duration: 6 months

plantemoran.com What School Personnel Administrators Need to know

Student Details. Student ID e Date of Birth 10/02/1989 Place of Birth INDIA Nationality Italian. Education. Turin. Berlin

Certified Cyber Security Analyst VS-1160

TRADING ONLINE E STATISTICA PDF

CONTENTS AT A GMi#p. Chapter I Ethical Hacking Basics I Chapter 2 Cryptography. Chapter 3 Reconnaissance: Information Gathering for the Ethical Hacker

CYBER LIABILITY. Bring on tomorrow. Network Security and Privacy. May 15, 2014

Analysis of Evidence in Cloud Storage Client Applications on the Windows Platform

NSA Surveillance, National Security and Privacy

Detailed Description about course module wise:

The Deplorable State of Law Firm Information Security: Preventing Law Firm Data Breaches

CRYPTUS DIPLOMA IN IT SECURITY

Linux and Law Enforcement

Curriculum Vitae, Lisa Gianmoena December 2014

Advanced Persistent Threats

FORENSIC ARTIFACTS FROM A PASS THE HASH (PTH) ATTACK BY: GERARD LAYGUI

KASPERSKY LAB: EMPOWERING INDUSTRIAL CYBER SECURITY

Smartphone Vulnerabilities Securing your personal and business data

Bring Your Own Device Bring Your Own Data? Thursday 10th April 2014 Dai Davis Solicitor and Chartered Engineer Partner, Percy Crow Davis & Co

Digital Forensic analysis of malware infected machine Case study ***

Karen McDowell, Ph.D., GCIH Information Security, Policy, and Records Office (ISPRO) June 2013 ANATOMY OF A HACK

Cyber Security in Taiwan's Government Institutions: From APT To. Investigation Policies

Unified Security, ATP and more

BlackBerry Universal Device Service. Demo Access. AUTHOR: System4u

Cyber Security. An Executive Imperative for Business Owners. 77 Westport Plaza, St. Louis, MO p f

Proactive Credential Monitoring as a Method of Fraud Prevention and Risk Mitigation. By Marc Ostryniec, vice president, CSID

The New Luxury World: l identità digitale nel lusso fa la differenza

Research Information Security Guideline

Unit 3 Cyber security

DATA SECURITY HACKS, HIPAA AND HUMAN RISKS

2012 NCSA / Symantec. National Small Business Study

Data Breach Strikes - Nerds & Geeks Unite: Effective Cooperation Between Privacy and Technical Experts Presented by: Paul H. Luehr, Managing Dir.

MOBILE SECURITY: DON T FENCE ME IN

Secure Your Mobile Workplace

Ph.D. Engineering and Applied Science, Computer Science, University of New Orleans, (Expected 2015)

Encyclopedia of Information Assurance Suggested Titles: March 25, 2013 The following titles have not been contracted.

Advanced Persistent Threats

forza horizon manual

Fondo Monetario Internazionale ricerca esperti

Advanced Digital Forensics ITP 475 (4 Units)

INFORMATION SECURITY FOR YOUR AGENCY

The B2G electronic invoicing in Italy 1 year later

From Perimetral Defense to Immune Systems: Protecting the National Cyber Space

AN INVESTIGATION INTO THE METHODS USED FOR TRAFFICKING OF CHILD ABUSE MATERIAL

Cyber Threats Insights from history and current operations. Prepared by Cognitio May 5, 2015

Security Threats to Business, the Digital Lifestyle, and the Cloud. Trend Micro Predictions for 2013 and Beyond

Build Your Own Security Lab

Certified Secure Computer User

Advanced Biometric Technology

Transcription:

\\\\\\\\\\\\ DIGITAL FORENSICS ALUMNI //////////// Newsletter 21 - Agosto 2012 \\\\\\\\\\\\\\\\\\\\\\\\\///////////////////////// Indice: 1 - News 2 - Leggi, Dottrina, Giurisprudenza 3 - Links 4 - Tools 5 - Papers 6 - Formazione 7 - Conferences e Call for Papers ************************************************** NEWS TRIBUNALI E DROPBOX http://blog.cesaregallotti.it/2012/08/tribunali-e-dropbox.html INTERVIEW WITH PASQUALE STIRPARO by FORENSICS INTERVIEWS http://f-interviews.com/2012/08/15/interview-with-pasquale-stirparo/ ANONYMOUS ATTACCA IL SITO WEB DELL'INTERPOL http://www.ilsole24ore.com/art/tecnologie/2012-09-03/anonymous-attacca-sito-interpol-101808.shtm [ENG] http://rt.com/news/anonymous-interpol-free-assange-607/ ANONYMOUS RUBA UN MILIONE DI ID APPLE DAL SITO DELL' FBI http://www.corriere.it/scienze_e_tecnologie/12_settembre_04/hackers-mettono-online-un-milione-di FBI HACK YIELDED 12 MILLION IPHONE AND IPAD IDS, ANONYMOUS CLAIMS http://www.zdnet.com/fbi-hack-yielded-12-million-iphone-and-ipad-ids-anonymous-claims-7000003668 http://mashable.com/2012/09/04/hackers-apple-device-id/ http://www.theregister.co.uk/2012/09/04/antisec_hackers_fbi_laptop_hack/ PHILIPS HACKED, PLAINTEXT PASSWORDS REVEALED AS R00TBEER GANG STRIKES AGAIN http://nakedsecurity.sophos.com/2012/08/21/r00tbeer-returns-philips-hacked-poor-passwords/ RESEARCHERS SHOW HOW TO CRACK ANDROID ENCRYPTION http://www.forensicfocus.com/news/article/sid=1921/ GAUSS MALWARE BELIEVED TO BE RELATED TO FLAME http://www.informationweek.com/security/attacks/flame-20-gauss-malware-targets-banking-c/2400052 http://www.wired.com/threatlevel/2012/08/gauss-espionage-tool/ http://blogs.computerworld.com/security/20816/gauss-malware-nation-state-cyber-espionage-banking http://www.securelist.com/en/analysis/204792238/gauss_abnormal_distribution GAUSS RESEARCHERS COLLIDE http://www.darkreading.com/advanced-threats/167901091/security/attacks-breaches/240006095/gauss- HACKER GOING TO DEMONSTRATE OPEN SOURCE TOOL TO CRACK HASHES WITH SPEED OF 154 BILLION/SEC http://thehackernews.com/2012/07/hacker-going-to-demonstrate-open-source.html APPEALS COURT OKS WARRANTLESS PHONE GPS TRACKING http://www.policeone.com/police-products/police-technology/gps/articles/5916070-appeals-court-ok AUSTRALIA'S PRIVACY COMMISSIONER TELLS GOOGLE TO DESTROY STREETVIEW PAYLOAD DATA http://www.theregister.co.uk/2012/08/08/google_must_destroy_data/ HAS HACKING TEAM'S GOVERNMENT TROJAN BEEN USED AGAINST JOURNALISTS? https://www.privacyinternational.org/blog/has-hacking-teams-government-trojan-been-used-against- THIS IS NOT SURVEILLANCE AS WE KNOW IT: THE ANATOMY OF FACEBOOK MESSAGES https://www.privacyinternational.org/blog/facebook-message-anatomy

FTC AND FACEBOOK REACH SETTLEMENT OVER PRIVACY PRACTICES http://news.cnet.com/8301-1009_3-57490948-83/ftc-settles-facebook-privacy-complaint-sans-googlehttp://www.computerworld.com/s/article/9230171/ftc_gives_final_approval_to_facebook_privacy_sett RIM DENIES INDIA'S CLAIMS THAT IT HAS ENCRYPTION KEYS FOR ENTERPRISE CUSTOMERS http://www.v3.co.uk/v3-uk/news/2196348/rim-rebuffs-claims-blackberry-encryption-keys-given-to-in http://www.theregister.co.uk/2012/08/02/rim_keys_india/ http://articles.economictimes.indiatimes.com/2012-08-02/news/33001399_1_blackberry-enterprise-en DROPBOX CUSTOMER EMAIL BREACH EXPLAINED http://www.h-online.com/security/news/item/dropbox-confirms-data-leak-1657230.html http://www.scmagazine.com/employee-password-reuse-behind-dropbox-spam-outbreak/article/253004/ MOBILE DEVICE TROJAN ZITMO NOW TARGETS BLACKBERRY http://www.scmagazine.com/blackberry-android-users-targeted-by-new-zeus-trojan/article/253940/ http://www.theregister.co.uk/2012/08/08/zeus_comes_to_blackberry/ ANDROID TROJAN INFECTS 500,000 DEVICES http://www.theregister.co.uk/2012/08/20/android_smszombie/ APPLE PHONES ARE AES-TOUGH, SAYS FORENSICS EXPERT http://www.forensicfocus.com/news/article/sid=1922/ ------------------- MAT HONAN EPIC HACKING SAGA ------------------- HOW APPLE AND AMAZON SECURITY FLAWS LED TO MY EPIC HACKING http://www.wired.com/gadgetlab/2012/08/apple-amazon-mat-honan-hacking/ AMAZON QUIETLY CLOSES SECURITY HOLE AFTER JOURNALIST S DEVASTATING HACK http://www.wired.com/gadgetlab/2012/08/amazon-changes-policy-wont-add-new-credit-cards-to-accoun APPLE CONFIRMS SUSPENSION OF OVER-THE-PHONE PASSWORD RESETS http://www.wired.com/gadgetlab/2012/08/apple-confirms-it-has-suspended-over-the-phone-appleid-pa http://arstechnica.com/security/2012/08/apple-freezes-over-the-phone-password-resets-in-response AFTER EPIC HACK, APPLE SUSPENDS OVER-THE-PHONE APPLEID PASSWORD RESETS http://www.wired.com/gadgetlab/2012/08/apple-icloud-password-freeze/?utm_source=contextly&utm_me APPLE ACCOUNT HACK RAISES CONCERN ABOUT CLOUD STORAGE http://edition.cnn.com/2012/08/06/tech/mobile/icloud-security-hack/index.html?utm_source=feedbur MAT HONAN: HOW I RESURRECTED MY DIGITAL LIFE AFTER AN EPIC HACKING http://www.wired.com/gadgetlab/2012/08/mat-honan-data-recovery/ LEGGI, DOTTRINA, GIURISPRUDENZA MODIFICHE ALLA NORMATIVA SUL SEGRETO DI STATO http://www.adnkronos.com/ign/news/politica/servizi-segreti-senato-approva-la-riforma-e-legge_313 GARANTE PRIVACY: COMUNICAZIONE DELLE VIOLAZIONI DI DATI PERSONALI http://www.garanteprivacy.it/garante/doc.jsp?id=1915485 GARANTE PRIVACY: LA PRIVACY A SCUOLA https://www.ansa.it/web/notizie/rubriche/speciali/2012/09/05/apripista-studenti-bolzano-salassohttp://www.garanteprivacy.it/garante/document?id=1922869#1 LINKS BLOGS & PORTALS http://www.forensicfocus.com/computer-forensics-blog http://articles.forensicfocus.com/ http://www.forensicblog.org http://windowsir.blogspot.com http://computer-forensics.sans.org/blog

http://computer.forensikblog.de/en/ http://www.forensickb.com http://www.forensicinnovations.com/blog http://forensicsfromthesausagefactory.blogspot.com/ http://ericjhuber.blogspot.com/ http://consoleforensics.com/ http://www.forensicphotoshop.blogspot.com/ http://forensicmethods.com/ http://blog.digital-forensics.it/ http://f-interviews.com/ [ITA] http://pierluigiperri.com/ http://www.techandlaw.net/ http://xwaysclips.blogspot.it/ <--- NEW http://justaskweg.com/ <--- NEW http://memoryforensics.blogspot.it/ <--- NEW https://www.privacyinternational.org/ <--- NEW PODCASTS http://cyberspeak.libsyn.com http://forensic4cast.com/ WIKIS http://www.forensicswiki.org http://www.forensicwiki.com http://www.forensicswiki.org/wiki/scheduled_training_courses http://www.forensicswiki.org/index.php?title=upcoming_events http://cyber.law.harvard.edu/cybersecurity/cybersecurity_annotated_bibliography <--- NEW TOOLS http://www.opensourceforensics.org/ http://www.cftt.nist.gov/ http://computercrimeinfo.com/info.html http://www.mikesforensictools.co.uk/software.html http://regripper.wordpress.com/ http://code.google.com/p/regripperplugins/ http://www.mobileforensicscentral.com/mfc/ http://forensiccontrol.com/resources/free-software/ http://winfe.wordpress.com/ GOOGLE DIGITAL FORENSICS SEARCH http://www.google.com/cse/home?cx=011905220571137173365:7eskxxzhjj8 TOOLS MFT2CSV - MFT DECODER, NTFS FILE EXTRACTER & CMDLINE FILEINFO DUMPER http://code.google.com/p/mft2csv/wiki/setregtime PESECTIONEXTRACTOR EXTRACTING PE SECTIONS AND THEIR STRINGS http://www.hexacorn.com/blog/2012/09/02/pesectionextractor-extracting-pe-sections-and-their-stri VOLATILITY 2.1 https://code.google.com/p/volatility/ BUSTER SANDBOX ANALYZER http://bsa.isoftware.nl/ REGISTRY DECODER 1.4 http://dfsforensics.blogspot.it/2012/08/registry-decoder-14-released-and.html MINIMAL IR LIVE CD http://fdtk.com.br/www/ferramentas/ TCPFLOW 1.3.0 https://github.com/simsong/tcpflow/downloads SANTOKU - LINUX DISTRO FOR MOBILE SECURITY, MALWARE ANALYSIS, AND FORENSICS

https://santoku-linux.com/ http://articles.forensicfocus.com/2012/08/28/new-linux-distro/ PAPERS CHASING APT http://www.secureworks.com/research/threats/chasing_apt/ http://krebsonsecurity.com/2012/07/tagging-and-tracking-espionage-botnets/ DETECTING DATA THEFT USING STOCHASTIC FORENSICS https://media.blackhat.com/bh-us-12/briefings/grier/bh_us_12_grier_catching_insider_data_theft_w INTO THE DROID GAINING ACCESS TO ANDROID USER DATA https://viaforensics.com/mobile-security-category/droid-gaining-access-android-user-data.html 20 CRITICAL SECURITY CONTROLS FOR EFFECTIVE CYBER DEFENSE http://www.sans.org/critical-security-controls/winter-2012-poster.pdf WINDOWS 8 FORENSICS, TIMELINE ANALYSIS, ETC http://windowsir.blogspot.it/2012/09/links-tools-etc.html AUTOMATED PLIST PARSER http://az4n6.blogspot.it/2012/08/automated-plist-parser.html EXFILTRATION FORENSICS IN THE AGE OF THE CLOUD http://computer-forensics.sans.org/summit-archives/2012/exfiltration-forensics-in-the-age-of-the http://forensicaliente.blogspot.it/2012/07/sans-dfir-summit-2012-thoughts-links.html CLOUD BASED FORENSICS ARTIFACTS http://forensicartifacts.com/tag/cloud-forensics/ DROPBOX FORENSICS FOLLOW-UP http://forensicaliente.blogspot.it/2011/07/dropbox-forensics-follow-up.html TRACKING USB FIRST INSERTION IN EVENT LOGS http://www.swiftforensics.com/2012/08/tracking-usb-first-insertion-in-event.html WILL DIGITAL FORENSICS CRACK SSD S? http://articles.forensicfocus.com/2012/08/24/will-digital-forensics-crack-ssds/ MAKING THE MOST OF GPS EVIDENCE http://articles.forensicfocus.com/2012/08/27/computer-analysts-and-experts-making-the-most-of-gp [ITA] NORMAZIONE TECNICA VOLONTARIA: LE REGOLE DEL GIOCO http://www.uni.com/index.php?option=com_content&view=article&id=1555%3aun-libro-per-lestate-le-r FORMAZIONE SEMINARIO IISFA Settembre 21, sala conferenze della società Eur Spa - Roma Ore 14.30 16.30 Eugenio Albamonte Sostituto Procuratore presso la Procura della Repubblica di Roma Pool reat Rapporti tra Pubblico Ministero e consulente tecnico negli accertamenti aventi ad oggetto suppo Ore 16.30-18.30 Sergio Civino Computer Forensics Expert Accertamenti Tecnici su Dispositivi Mobile TECH AND LAW CENTER - LECTURE WITH SUSAN LANDAU ON "SURVEILLANCE OR SECURITY?" Settembre, 24, Politecnico di Milano Ore 14:00-17:00 http://www.techandlaw.net/event/interview-with-prof-susan-landau/ http://www.techandlaw.net/2012/08/24/september-24-surveillance-or-security/

Interview http://www.techandlaw.net/resources/interviews/ FIRST POLICY WORKSHOP: SURVEILLING SURVEILLANCE Settembre 25-26, Firenze http://www.ittig.cnr.it/smart2012/ SANS PRAGUE FORENSICS Ottobre 7-13, 2012 - Prague, Czech Republic http://www.sans.org/prague-forensics-2012/ SANS LONDON 2012 26 November - 3 December - London, UK https://www.sans.org/event/london-2012 CONFERENCES & CFP SECURITY SUMMIT Ottobre 4, Verona https://www.securitysummit.it 2012 SLEUTH KIT AND OPEN SOURCE DIGITAL FORENSICS CONFERENCE October 3, 2012 - Chantilly, VA, USA CfP Deadline: April 16, 2012 http://www.basistech.com/about-us/events/open-source-forensics-conference/ IWCCF 2012 - FIRST INTERNATIONAL WORKSHOP ON CLOUD COMPUTING FOR FORENSICS USE October 3-5, 2012, St. Petersburg, Russia http://www.icumt.org/2012/images/stories/pdf/iwccf.pdf RSA CONFERENCE EUROPE 2012 October 9-11, London www.rsaconference.com/events/2012/europe ICDF2C - 4th International Conference on Digital Forensics & Cyber Crime October 24 26, 2012 - Lafayette, Indiana, USA http://d-forensics.org/2012/show/home 2012 EUROPEAN SCADA SUMMIT Pre-Summit Course: 5-9 December, 2012 Summit: 10-11 December, 2012 Barcelona, Spain http://www.sans.org/info/112039 Newsletter a cura del Consiglio dell Associazione DFA - Digital Forensics Alumni. INFORMATIVA AI SENSI DELL ART. 13 DEL D.LGS. 196/2003 Digital Forensics Alumni in qualità di titolare del trattamento dei dati personali, informa che