\\\\\\\\\\\\ DIGITAL FORENSICS ALUMNI //////////// Newsletter 13 - Dicembre 2011 \\\\\\\\\\\\\\\\\\\\\\\\\/////////////////////////



Similar documents
SENTENZA DELLA CORTE DI CASSAZIONE: L'INVIO DI NON INTEGRA IL REATO DI MOLESTIE EX ART. 66

TRATTAMENTI DATI PER ATTIVITÀ DI PROPAGANDA ELETTORALE - ESONERO DALL'INFORMATIVA


CHROME 23 INCLUDES DO NOT TRACK OPTION

NATIONWIDE INSURANCE NETWORK BREACH AFFECTS ONE MILLION

LA FARNESINA 'BUCATA' DAGLI HACKER

AUSTRALIA'S PRIVACY COMMISSIONER TELLS GOOGLE TO DESTROY STREETVIEW PAYLOAD DATA

TOR: L'FBI SI INFILTRA E ARRESTA UN PEDOFILO

Agenda. John Veldhuis, Sophos The playing field Threats Mobile Device Management. Pagina 2

2012 Global Threats and Trends

It s 2 o clock: Who Has Your Data? Josh Krueger Chief Technology Officer Integrity Technology Solutions

Crosscheck Web Services Patent Pending Automated SOA Compliance and Security Assessment

platforms Android BlackBerry OS ios Windows Phone NOTE: apps But not all apps are safe! malware essential

\\\\\\\\\\\\ DIGITAL FORENSICS ALUMNI //////////// Newsletter 34 - Marzo/Aprile 2014 \\\\\\\\\\\\\\\\\\\\\\\\\/////////////////////////

Tutorial on Smartphone Security

Encyclopedia of Information Assurance Suggested Titles: March 25, 2013 The following titles have not been contracted.

How To Be A Computer Forensics Examiner

Smart Ideas for Smartphone Security

The Incident Response Playbook for Android and ios

FLAVIO D ANNUNZIO Digital for Business

Chapter 12 - Software. Unit 1 Role and function of application software

Mobile Phone Monitoring Software

AN INVESTIGATION INTO THE METHODS USED FOR TRAFFICKING OF CHILD ABUSE MATERIAL

Case Study: Smart Phone Deleted Data Recovery

Security Challenges and Solutions for Higher Education. May 2011

Smart Policing Initiative Website and Social Media

Smartphone Hacks and Attacks: A Demonstration of Current Threats to Mobile Devices

Proactive Credential Monitoring as a Method of Fraud Prevention and Risk Mitigation. By Marc Ostryniec, vice president, CSID

Joint Universities Computer Centre Limited ( JUCC ) Information Security Awareness Training - Session One

Identity Theft Prevention Presented by: Matt Malone Assero Security

MOBILE SECURITY: DON T FENCE ME IN

Two-Factor Authentication User FAQ s

Leading business advisers. Mobile devices Secure or security risk?

Clarity High School Student Survey

Le sfide per il Sistema della Ricerca Trentino nell ambito della gestione dell Identità Digitale

Cybercrime in Canadian Criminal Law

Certified Secure Computer User

Lecture Embedded System Security A. R. Darmstadt, Introduction Mobile Security

McAfee Multi Access from ø. Step-by-step guide to protecting your devices. Always.

COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM

Certified Cyber Security Analyst VS-1160

Unlock Digital Intelligence Accelerate Investigations Anywhere

Five Trends to Track in E-Commerce Fraud

OCR LEVEL 3 CAMBRIDGE TECHNICAL

EDITION MOBILE MATTERS: THE IMPACT OF MOBILE FRONTSTREAM NONPROFIT TECHNOLOGY ON PEER- DRIVEN FUNDRAISING CAMPAIGNS FRONTSTREAM.

Information Security Updates Mobile Security Best Practices for General User

The SMB Cyber Security Survival Guide

Whitepaper on AuthShield Two Factor Authentication and Access integration with Microsoft outlook using any Mail Exchange Servers

Breakfast Meeting: Securing your Secured Data Digital Forensics, Fraud and Forensic Advancements

Conducting Virtual Meetings

Certified Secure Computer User

Remaining Anonymous. Osman Surkatty surkatty.org

The Challenges of Implementing a Bring Your Own Device Policy

Two Factor Authentication - USER GUIDE

Managing Your Cyber & Data Risk 2010 NTA Convention Montreal, Quebec

Digital Citizenship Lesson Plan

Identity Fraud: Presented by: MOHD ZABRI ADIL TALIB Head, Digital Forensics CyberSecurity Malaysia

Hakhel has received the following essential information from Torah Jews who are smart phone experts:

CRYPTUS DIPLOMA IN IT SECURITY

Christos Douligeris cdoulig at unipi dot gr. Department of Informatics University of Piraeus

The Evolving Threat Landscape: Protecting Your Mobile and Virtual Environment from Emerging Security Threats

Know how to publish, integrate and share using social media

RDM on Demand Privacy Policy

Android Developer Applications

Can I deposit foreign checks (for example, from Canada) through mobile check deposit?

A Survey on Mobile Forensic for Android Smartphones

A Wake-Up Call? Fight Back Against Cybercrime. Prepared for: Ricky Link Managing Director, Southwest Region May 15, 2014

SIMPLIFYING THE COMPLEXITY OF MOBILE DATA FORENSICS

CELL PHONE LOCATION, PRIVACY AND INTIMATE PARTNER VIOLENCE. by Kaofeng Lee & Erica Olsen *

Cyber Security and Information Assurance Controls Prevention and Reaction NOVEMBER 2013

RESEARCH 33 STATS TO KNOW WHEN MARKETING TO THE CONSTRUCTION INDUSTRY

INTEGRITY FORENSICS. Where the Evidence Tells the Truth. Terrance Maguire Chief Scientist. Digital Forensics Academy, LLC

A White Paper from AccessData Group. The Future of Mobile E-Discovery

Mobile Security: Controlling Growing Threats with Mobile Device Management

A White Paper from AccessData Group. The Future of Mobile E-Discovery

How To Solve A Violent Home Invasion With A United Force

Knowing Your Enemy How Your Business is Attacked. Andrew Rogoyski June 2014

Codeproof Mobile Security & SaaS MDM Platform

Hard vs. Soft Tokens Making the Right Choice for Security

Future of Mobile App Security. Vincent Sritapan Program Manager Cyber Security Division Science and Technology Directorate

Smartphone Forensics Analysis: A Case Study

Advanced Online Threat Protection: Defending. Malware and Fraud. Andrew Bagnato Senior Systems Engineer

GUJARAT TECHNOLOGICAL UNIVERSITY MASTER OF COMPUTER APPLICATIONS (MCA) SEMESTER: V

Hesperbot. Analysts at IKARUS Security Software GmbH successfully removed a self-locking Android Malware from an infected smartphone

Frequently Asked Questions. Frequently Asked Questions SSLPost Page 1 of 31 support@sslpost.com

Applying the 80/20 approach for Operational Excellence. How to combat new age threats, optimize investments and increase security.

GadgetTrak Mobile Security Android & BlackBerry Installation & Operation Manual

Monitor All Employee Activity Across PCs, Laptops & the Internet

White Paper: The Current State of BYOD

Cyber Security. An Executive Imperative for Business Owners. 77 Westport Plaza, St. Louis, MO p f

Protect Your Online Footprint. HINTS & TIPS provided by MWR InfoSecurity and the Data Baby project

Ed Ferrara, MSIA, CISSP Fox School of Business

Where Do You Draw the Creepy Line? Privacy, Big Data Analytics and the Internet of Things

Staying Safe Online. A Practical Guide for Parents and Children.

Celly FAQ. inbox cells people help. celly help. Common Support Questions. celly company. General. school. policies. About Cells.

Securing mobile devices in the business environment

Mobile Operating Systems & Security

TECHconnect Classes for Seniors

Mobile Devices in Electronic Discovery

Two-Factor Authentication: Guide to FEXCO CFX SMS/APP Verification

Transcription:

\\\\\\\\\\\\ DIGITAL FORENSICS ALUMNI //////////// Newsletter 13 - Dicembre 2011 \\\\\\\\\\\\\\\\\\\\\\\\\///////////////////////// Indice: 1 - News 2 - Links 3 - Tools 4 - Papers 5 - Formazione 6 - Conferences e Call for Papers ************************************************** NEWS SVIZZERA, IL PARADISO DEL P2P SONO LEGALI I DOWNLOAD PIRATA http://www.repubblica.it/tecnologia/2011/12/06/news/svizzera_download-26129439/?ref=hrec1-9 HOW TO MAKE A DIFFERENCE IN DIGITAL FORENSICS by Rob T Lee http://computer-forensics.sans.org/blog/2011/12/06/how-to-make-a-difference-in-the-digital-foren EU WANTS FIRMS TO STOP SELLING SURVEILLANCE TOOLS TO REPRESSIVE REGIMES http://www.net-security.org/secworld.php?id=12077 USING LOG PARSER IN TIMELINE ANALYSIS http://dfstream.blogspot.com/2011/11/timeline-analysis-and-log-parser.html FRAUDSTERS BEAT TWO-FACTOR AUTHENTICATION, STEAL $45K http://www.net-security.org/secworld.php?id=12060 http://www.scmagazine.com.au/news/282310,45k-stolen-in-phone-porting-scam.aspx/0 HOW DIGITAL FORENSICS DETECTS INSIDER THEFT http://www.informationweek.com/news/security/management/232300409?esid=1099&rid=65070&source=ema FACEBOOK BUG ALLOWS USERS TO ACCESS PRIVATE PHOTOS http://www.net-security.org/secworld.php?id=12059 TOP 5 ANDROID MALWARE FAMILIES http://www.net-security.org/malware_news.php?id=1927 IRANIAN ENGINEER SAYS GPS HACK TRICKED DRONE INTO LANDING http://www.theregister.co.uk/2011/12/15/us_spy_drone_gps_spoofing/ http://www.computerworld.com/s/article/9222728/iran_tricked_u.s._spy_drone_into_landing_in_count http://www.theregister.co.uk/2011/12/21/spy_drone_hijack_gps_spoofing_implausible/ IRANIAN TV SHOWS DOWNED US DRONE http://www.bbc.co.uk/news/world-middle-east-16098250 JUMP LIST ANALYSIS http://windowsir.blogspot.com/2011/12/jump-list-analysis.html BLACKBERRY KB - LIST OF ALL DATABASES ON THE BLACKBERRY SMARTPHONE http://btsc.webapps.blackberry.com/btsc/search.do?cmd=displaykc&doctype=kc&externalid=kb03974 81% OF BRITISH PUBLIC WOULD BE HAPPY FOR THE POLICE TO SCAN THEIR MOBILE PHONE http://www.forensicfocus.com/index.php?name=news&file=article&sid=1750 JOLT IN WIKILEAKS CASE: FEDS FOUND MANNING-ASSANGE CHAT LOGS ON LAPTOP http://www.wired.com/threatlevel/2011/12/manning-assange-laptop/ AFOD BLOG WITH ANDREW HOOG ON MOBILE DEVICE SECURITY AND FORENSICS http://www.ericjhuber.com/2011/12/afod-blog-with-andrew-hoog-on-mobile.html FACEBOOK FIXES COMPLAINT FEATURE ABUSED TO BYPASS PHOTO PRIVACY, ZUCKERBERG AMONG VICTIMS

http://threatpost.com/en_us/blogs/facebook-fixes-complaint-feature-abused-bypass-photo-privacy-z INCIDENT RESPONSE ON 64-BIT WINDOWS USING 32-BIT TOOLS http://blog.zeltser.com/post/13635277852/32-bit-tools-redirected-on-64-bit-windows WINDOWS 8 FORENSIC OVERVIEW http://randomthoughtsofforensics.blogspot.com/2011/12/windows-8-forensic-overview.html NATO: CYBERCRIME DRAINS ONE TRILLION DOLLARS FROM ECONOMY YEARLY http://www.infosecisland.com/blogview/18577-nato-cybercrime-drains-one-trillion-dollars-from-eco ENISA RELEASES DIGINOTAR REPORT: OPERATION BLACK TULIP http://www.infosecisland.com/blogview/18558-enisa-releases-diginotar-report-operation-black-tuli -------------------- CARRIER IQ SAGA -------------------- http://www.theregister.co.uk/2011/12/01/al_franken_carrier_iq/ http://money.cnn.com/2011/12/01/technology/carrier_iq/index.htm http://www.zdnet.com/blog/btl/carrier-iq-speaks-out-points-finger-at-networks-customers/64528 http://www.washingtonpost.com/blogs/faster-forward/post/today-in-tech-carrier-iq-draws-consumerhttp://www.wired.com/threatlevel/2011/12/carrier-iq-backlash/ CARRIER IQ FACING LAWSUITS OVER TRACKING SOFTWARE http://www.computerworld.com/s/article/9222424/8_companies_hit_with_lawsuit_over_carrier_iq_soft http://news.cnet.com/8301-1009_3-57335851-83/carrier-iq-faces-lawsuits-lawmaker-seeks-ftc-probe/ CARRIER IQ PUT UNDER THE MICROSCOPE IN EUROPE http://www.computerworld.com/s/article/9222411/european_regulators_start_investigating_carrier_i http://www.businessweek.com/news/2011-12-05/apple-questioned-in-germany-as-carrier-iq-use-probed LIST OF PHONES THAT HAVE CARRIER IQ INSTALLED: http://gizmodo.com/5868732/the-complete-list-of-all-the-phones-with-carrier-iq-spyware-installed PODCAST: CARRIER IQ IS NOT A KEYLOGGER BY DAN ROSEMBERG http://spectrum.ieee.org/podcast/telecom/security/carrier-iq-myth-versus-reality http://news.cnet.com/8301-31921_3-57336801-281/carrier-iq-analysis-finds-no-evidence-of-keylogge LINKS BLOGS http://www.forensicfocus.com/computer-forensics-blog http://articles.forensicfocus.com/ http://www.forensicblog.org http://windowsir.blogspot.com http://computer-forensics.sans.org/blog http://computer.forensikblog.de/en/ http://www.forensickb.com http://www.forensicinnovations.com/blog http://forensicsfromthesausagefactory.blogspot.com/ http://ericjhuber.blogspot.com/ http://consoleforensics.com/ http://www.forensicphotoshop.blogspot.com/ http://forensicmethods.com/ http://blog.digital-forensics.it/ http://f-interviews.com/ - NEW [ITA] http://pierluigiperri.com/ PODCASTS http://cyberspeak.libsyn.com http://forensic4cast.com/ WIKIS http://www.forensicswiki.org http://www.forensicwiki.com http://www.forensicswiki.org/wiki/scheduled_training_courses http://www.forensicswiki.org/index.php?title=upcoming_events

TOOLS http://www.opensourceforensics.org/ http://www.cftt.nist.gov/ http://computercrimeinfo.com/info.html http://www.mikesforensictools.co.uk/software.html http://regripper.wordpress.com/ http://code.google.com/p/regripperplugins/ http://www.mobileforensicscentral.com/mfc/ GOOGLE DIGITAL FORENSICS SEARCH http://www.google.com/cse/home?cx=011905220571137173365:7eskxxzhjj8 TOOLS INTERNET EVIDENCE FINDER (IEF) v4.5 http://www.jadsoftware.com/?page_id=1083 REMNUX v3 http://zeltser.com/remnux/ TEXT SECURE - TWITTER OPEN SOURCES ANDROID SECURITY SOFTWARE http://www.theinquirer.net/inquirer/news/2134142/twitter-sources-android-security-software https://github.com/whispersystems/textsecure LANTERNLITE UPDATED https://github.com/katanaforensics/lanternlite GNU DDRESCUE v1.15 http://freecode.com/projects/addrescue#release_340119 IPHONE FORENSICS TOOLS http://seclist.wordpress.com/2011/12/09/iphone-forensics-tools/ PAPERS [LIBRO] - COMPUTER FORENSICS E INDAGINI DIGITALI S. ATERNO, F. CAJANI, G. COSTABILE, M. MATTIUCCI, G. MAZZARACO Manuale tecnico-giuridico e casi pratici prefazione di Pietro GRASSO e Domenico VULPIANI http://telematici.com/computer-forensics/ http://telematici.com/wp-content/uploads/2011/11/locandina.pdf http://www.experta.it/lex/-hcdocumento/id/528/computer-forensics-e-indagini-digitali.html FORENSIC SECURITY ANALYSIS OF GOOGLE WALLET http://viaforensics.com/mobile-security/forensics-security-analysis-google-wallet.html DETECTING DATA THEFT USING STOCHASTIC FORENSICS http://www.grierforensics.com/datatheft/detecting_data_theft_using_stochastic_forensics.pdf LOG2TIMELINE - TIMELINE CHEATSHEET http://blogs.sans.org/computer-forensics/files/2011/12/digital-forensics-incident-response-log2t LAW ENFORCEMENT AND CORRECTIONS TECHNOLOGY ADVISORY COUNCIL 2010 ANNUAL REPORT http://www.justnet.org/lists/justnet%20resources/attachments/3157/lectac-2010-report.pdf CELLEBRITE IOS DEVICE PHYSICAL EXTRACTION MANUAL http://www.ume-update.com/ufed/ios_user_manual.pdf DECODING MALWARE SSL USING BURP PROXY http://sempersecurus.blogspot.com/2011/12/decoding-malware-ssl-using-burp-proxy.html ios FORENSICS & OPEN SOURCE TOOLS

http://www.slideshare.net/blemere/ios-forensics-amp-open-source-tools SKYPE IN EDISCOVERY http://articles.forensicfocus.com/2011/11/09/skype-in-ediscovery/ ANDROID FORENSICS STUDY OF PASSWORD AND PATTERN LOCK PROTECTION http://articles.forensicfocus.com/2011/11/18/android-forensics-study-of-password-and-pattern-loc IPHONE TRACKING FROM A FORENSIC POINT OF VIEW http://articles.forensicfocus.com/2011/11/20/iphone-tracking-from-a-forensic-point-of-view/ MALWARE DETECTION CHECKLIST http://sketchymoose.blogspot.com/2011/12/malware-detection-checklist.html FORMAZIONE CICLO SEMINARI "FREEDOM FRIDAYS" - DIRITTI UMANI, RESISTENZA ELETTRONICA, HACKING E DISSIDENTI D c/o Università degli Studi di Milano - Via Festa del Perdono n. 7-20122 - MILANO Dipartimento: Cesare Beccaria II Piano c/o Saletta conferenze Venerdì 27 gennaio 2012 (9:30 13:30) Sistemi di filtraggio e azioni di resistenza elettronica in Australia, Nuova Zelanda, Canada e S Dott. Diego Dimalta Venerdì 17 febbraio 2012 (9:30 13:30) Le libertà digitali e i progetti di legge in Islanda, Spagna e Francia Dott. Guglielmo Troiano Venerdì 30 marzo 2012 (9:30 13:30) Le libertà digitali in Italia, i Tor crackdown e i trojan di Stato in Germania. Dott.ssa Barbara Coccagna e Dott. Niccolò Rossi Venerdì 20 aprile 2012 (9:30 13:30) Le libertà digitali nelle due Coree, in Cambogia e in Vietnam Dott. Edoardo Artese Venerdì 25 maggio 2012 (9:30 13:30) Le libertà digitali e le azioni di hacking dei dissidenti digitali in Siria e Arabia, Dott. Ales Venerdì 15 giugno 2012 (9:30 13:30) La resistenza digitale in Russia, Bielorussia, Tagikistan e Uzbekistan, Dott. Stefano Rossetti CONFERENCES & CFP ACCESSDATA USERS' CONFERENCE May 8-10, 2012 - Caesars Palace, Las Vegas http://accessdata.com/aduc ADFSL 2012 CONFERENCE ON DIGITAL FORENSICS, SECURITY AND LAW May 30-31, 2012 - Richmond, Virginia USA http://www.digitalforensics-conference.org SFCS - IEEE INTERNATIONAL WORKSHOP ON SECURITY AND FORENSICS IN COMMUNICATION SYSTEMS June 10-15, 2012 - Ottawa, Canada https://sites.google.com/site/sfcs2012/ CSET '12-5TH WORKSHOP ON CYBER SECURITY EXPERIMENTATION AND TEST August 6, 2012, Bellevue, WA http://www.usenix.org/events/cset12/ DFRWS - 12th DIGITAL FORENSIC RESEARCH CONFERENCE August 6-8, 2012 - Washington, DC

- Submission deadline: February 20, 2012 (any time zone). http://www.dfrws.org/2012/cfp.shtml