CHROME 23 INCLUDES DO NOT TRACK OPTION http://arstechnica.com/tech-policy/2012/11/do-not-track-finally-arrives-with-version-23-of-chrom



Similar documents
NATIONWIDE INSURANCE NETWORK BREACH AFFECTS ONE MILLION

AUSTRALIA'S PRIVACY COMMISSIONER TELLS GOOGLE TO DESTROY STREETVIEW PAYLOAD DATA

LA FARNESINA 'BUCATA' DAGLI HACKER

TOR: L'FBI SI INFILTRA E ARRESTA UN PEDOFILO

TRATTAMENTI DATI PER ATTIVITÀ DI PROPAGANDA ELETTORALE - ESONERO DALL'INFORMATIVA

\\\\\\\\\\\\ DIGITAL FORENSICS ALUMNI //////////// Newsletter 34 - Marzo/Aprile 2014 \\\\\\\\\\\\\\\\\\\\\\\\\/////////////////////////

\\\\\\\\\\\\ DIGITAL FORENSICS ALUMNI //////////// Newsletter 36 - Luglio/Agosto 2014 \\\\\\\\\\\\\\\\\\\\\\\\\/////////////////////////

\\\\\\\\\\\\ DIGITAL FORENSICS ALUMNI //////////// Newsletter 13 - Dicembre 2011 \\\\\\\\\\\\\\\\\\\\\\\\\/////////////////////////

ARRIVA IL PRIMO BANCOMAT BITCOIN IN ITALIA

SENTENZA DELLA CORTE DI CASSAZIONE: L'INVIO DI NON INTEGRA IL REATO DI MOLESTIE EX ART. 66


plantemoran.com What School Personnel Administrators Need to know

CYBER SECURITY THREAT REPORT Q1

Christos Douligeris cdoulig at unipi dot gr. Department of Informatics University of Piraeus

Intothe Eyeof the Twister 19 Oct2012

AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS. ftrsecure.com

Master of Science in Information Systems & Security Management. Courses Descriptions

Using End User Device Encryption to Protect Sensitive Information

KEY STEPS FOLLOWING A DATA BREACH

"This is a truly remarkable attack, but not. just in its scope hackers successfully. penetrated one of the most secure

Crosscheck Web Services Patent Pending Automated SOA Compliance and Security Assessment

A practical guide to IT security

Belmont Savings Bank. Are there Hackers at the gate? 2013 Wolf & Company, P.C.

Certified Cyber Security Analyst VS-1160

Detailed Description about course module wise:

Apple ios 8 Security

FORBIDDEN - Ethical Hacking Workshop Duration

Cyber Security, Cyber Crimes and Cyber Laws

Joint Universities Computer Centre Limited ( JUCC ) Information Security Awareness Training - Session One

10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)

Cybersecurity Best Practices

What is Cyber Liability

Securely Yours LLC IT Hot Topics. Sajay Rai, CPA, CISSP, CISM

VWC. Your gateway to a safe, secure and private Internet. Jeff Bermant, Co-Founder & Chief Executive Officer Jeff@vworldc.com

Certified Secure Computer User

Computer Hacking Forensic Investigator v8

EHS Privacy and Information Security

"This is a truly remarkable attack, but not. just in its scope hackers successfully. penetrated one of the most secure

WHITE PAPER: Cyber Crime and the Critical Need for Endpoint Security

Cyber Risks in the Boardroom

Agenda. John Veldhuis, Sophos The playing field Threats Mobile Device Management. Pagina 2

Mitigating and managing cyber risk: ten issues to consider

Security Breaches and Vulnerability Experiences Overview of PCI DSS Initiative and CISP Payment Application Best Practices Questions and Comments

NEW JERSEY STATE POLICE EXAMPLES OF CRIMINAL INTENT

A Database Security Management White Paper: Securing the Information Business Relies On. November 2004

Smart Ideas for Smartphone Security

2012 Data Breach Investigations Report

Is your Organization SAFE?

Cyber Security in Taiwan's Government Institutions: From APT To. Investigation Policies

Data Security on the Move. Mark Bloemsma, Sr. Sales Engineer Websense

KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES.

WHAT EVERY CEO, CIO AND CFO NEEDS TO KNOW ABOUT CYBER SECURITY.

MOBILE MALWARE REPORT

2010 AICPA Top Technology Initiatives. About the Presenter. Agenda. Presenter: Dan Schroeder, CPA/CITP Habif, Arogeti, & Wynne, LLP

What Risk Managers need to know about ICS Cyber Security

Introduction to Cyber Security / Information Security

Managing Your Cyber & Data Risk 2010 NTA Convention Montreal, Quebec

Certified Cyber Security Analyst VS-1160

Panel Title: Data Breaches: Industry and Law Enforcement Perspectives on Best Practices

Tableau Online Security in the Cloud

By Daniel E. Frank and Don Borelli

How-To Guide: Cyber Security. Content Provided by

It s 2 o clock: Who Has Your Data? Josh Krueger Chief Technology Officer Integrity Technology Solutions

Data Management Session: Privacy, the Cloud and Data Breaches

CYBER LIABILITY. Bring on tomorrow. Network Security and Privacy. May 15, 2014

National Cybersecurity Awareness Campaign

Top Five Things You Need to Know About Cybersecurity. Larry Mattox, VC3 Session #7

Cyber Security, Fraud and Corporate Account Takeovers LBA Bank Counsel Conference December 2014

Cyber - Security and Investigations. Ingrid Beierly August 18, 2008

Preventing Cyber Security Attacks Against the Water Industry

SBA Cybersecurity for Small Businesses. 1.1 Introduction. 1.2 Course Objectives. 1.3 Course Topics

Mobile Security. Luther Knight Mobility Management Technical Specialist, Europe IOT IBM Security April 28, 2015.

Encyclopedia of Information Assurance Suggested Titles: March 25, 2013 The following titles have not been contracted.

Ibrahim Yusuf Presales Engineer at Sophos Smartphones and BYOD: what are the risks and how do you manage them?

Cyber Security. An Executive Imperative for Business Owners. 77 Westport Plaza, St. Louis, MO p f

Cybersecurity Global status update. Dr. Hamadoun I. Touré Secretary-General, ITU

FERPA: Data & Transport Security Best Practices

Hope for the best, prepare for the worst:

Jim Donaldson, M.S., MPA, CHC, CIPP/US, CISSP. Director of Compliance, Chief Privacy and Information Security Officer. Pensacola, Florida

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster

Tech Report. Targeted attack on. France s TV5Monde

Digital Forensics for IaaS Cloud Computing

Loophole+ with Ethical Hacking and Penetration Testing

Web Protection for Your Business, Customers and Data

Cybercrime in Canadian Criminal Law

Demystifying Cyber Insurance. Jamie Monck-Mason & Andrew Hill. Introduction. What is cyber? Nomenclature

U. S. Attorney Office Northern District of Texas March 2013

Cloud and Security (Cloud hacked via Cloud) Lukas Grunwald

Cyber Risks in Italian market

Allianz Global Corporate & Specialty. Cyber Risks. Recent Trends. AIRMIC 15 th June 2015

This session was presented by Jim Stickley of TraceSecurity on Wednesday, October 23 rd at the Cyber Security Summit.

IT Security Management 100 Success Secrets

Data Breach Strikes - Nerds & Geeks Unite: Effective Cooperation Between Privacy and Technical Experts Presented by: Paul H. Luehr, Managing Dir.

Hands-On How-To Computer Forensics Training

Ethical Hacking & Cyber Security Workshop

Beyond Data Breach: Cyber Trends and Exposures

CYBERSECURITY BEST PRACTICES FOR SMALL AND MEDIUM PENNSYLVANIA UTILITIES

IIABSC Spring Conference

WHITE PAPER KEEPING CLIENT AND EMPLOYEE DATA SECURE DRIVES REVENUE AND BUILDS TRUST PROTECTING THE PROTECTOR

Cyber Threat Intelligence and Incident Coordination Center (C 3 ) Protecting the Healthcare Industry from Cyber Attacks

Transcription:

\\\\\\\\\\\\ DIGITAL FORENSICS ALUMNI //////////// Newsletter 24 - Novembre 2012 \\\\\\\\\\\\\\\\\\\\\\\\\///////////////////////// Indice: 1 - News 2 - Leggi, Dottrina, Giurisprudenza 3 - Links 4 - Tools 5 - Papers/Tutorials 6 - Formazione 7 - Conferences e Call for Papers ************************************************** NEWS ANONYMOUS HACK 30000 ACCOUNTS AND SOCIAL SECURITY NUMBERS FROM 'TELECOM ITALIA' http://thehackernews.com/2012/11/anonymous-hack-30000-accounts-and.html AUSTRALIA BECOMES FIRST NATION TO DISCOVER RELIABLE METHOD OF STOPPING TARGETED ATTACKS http://www.csoonline.com/article/720272/cyber-attacks-have-changed-but-australia-is-doing-someth http://www.technologyspectator.com.au/keeping-cybergeddon-bay MALWARE ATTACK AGAINST ISRAELI POLICE SYSTEM HELPS RESEARCHERS UNCOVER BROADER ATTACKS http://krebsonsecurity.com/2012/11/malware-spy-network-targeted-israelis-palestinians/ http://www.computerworld.com/s/article/9233514/researchers_identify_year_long_cyberespionage_eff HACKERS NET 36M IN EUROPE BANKING ATTACK http://www.ft.com/cms/s/0/a95130fc-3b18-11e2-b3f0-00144feabdc0.html [ITA] http://www.ilsole24ore.com/art/notizie/2012-12-06/rapina-viaggia-colpo-grosso-125604.shtml TROJAN COMMUNICATES WITH COMMAND-AND-CONTROL SERVER THROUGH GOOGLE DOCS http://www.h-online.com/security/news/item/trojan-uses-google-docs-to-communicate-with-its-contr http://www.computerworld.com/s/article/9233831/malware_uses_google_docs_as_proxy_to_command_and_ PRINCE WILLIAM PHOTOS ACCIDENTALLY REVEAL RAF PASSWORD http://nakedsecurity.sophos.com/2012/11/21/prince-william-photos-password/ ADOBE CONFIRMS DATA BREACH, HACKER LEAKED MORE THAN 150,000 CUSTOMER DETAILS http://www.voiceofgreyhat.com/2012/11/hacker-leaked-150000-customer-details-of-adobe.html SWISS SPY AGENCY WARNS CIA, MI6 OVER 'MASSIVE' SECRET DATA THEFT http://www.zdnet.com/swiss-spy-agency-warns-cia-mi6-over-massive-secret-data-theft-7000008282/ HOW METADATA BROUGHT DOWN CIA BOSS DAVID PETRAEUS http://www.newscientist.com/article/dn22511 RIM'S BLACKBERRY 10 RECEIVES FIPS CERTIFICATION AHEAD OF LAUNCH http://www.theregister.co.uk/2012/11/08/blackberry_10_fips/ http://news.cnet.com/8301-1009_3-57546812-83/blackberry-10-wins-u.s-security-clearance-ahead-ofhttp://www.informationweek.com/government/mobile/rim-blackberry-10-gets-government-securi/240062 CHROME 23 INCLUDES DO NOT TRACK OPTION http://arstechnica.com/tech-policy/2012/11/do-not-track-finally-arrives-with-version-23-of-chrom FACEBOOK ROLLS OUT HTTPS AS DEFAULT PROTOCOL http://www.informationweek.com/security/application-security/facebook-adopts-secure-web-pages-by http://www.cnn.com/2012/11/19/tech/social-media/facebook-https/index.html MEGAUPLOAD CASE CARRIES PRIVACY AND PROPERTY RIGHTS IMPLICATIONS FOR CLOUD STORAGE http://www.wired.com/threatlevel/2012/11/megaupload-data-what-to-do/ HAMBURG, GERMANY PROSECUTOR SAYS NO CRIMINAL INVESTIGATION INTO GOOGLE STREET VIEW http://www.computerworld.com/s/article/9233698/google_will_not_be_prosecuted_for_street_view_wi_

THE IMPACT OF EU PRIVACY REGULATION IN THE US http://jurist.org/forum/2012/11/clark-asay-eu-privacy.php GEORGIA TECH RELEASES CYBER THREATS FORECAST FOR 2013 http://www.homelandsecuritynewswire.com/dr20121115-georgia-tech-releases-cyber-threats-forecast- RESEARCHER FINDS NEARLY TWO DOZEN SCADA BUGS IN A FEW HOURS' TIME http://threatpost.com/en_us/blogs/researcher-finds-nearly-two-dozen-scada-bugs-few-hours-time-11 http://blog.exodusintel.com/2012/11/25/what-does-a-flightless-bird-and-scada-software-have-in-co CYBERCITY ALLOWS GOVERNMENT HACKERS TO TRAIN FOR ATTACKS http://www.washingtonpost.com/investigations/cybercity-allows-government-hackers-to-train-for-at HACKER COULD BE MYSTERIOUS FOUNDER OF ANTIVIRUS STARTUP http://krebsonsecurity.com/2012/11/infamous-hacker-heading-chinese-antivirus-firm/ HEWLETT-PACKARD DENIES KNOWLEDGE OF MONITORING PRODUCTS SOLD TO SYRIAN GOVERNMENT http://www.computerworld.com/s/article/9233997/hp_says_its_products_sold_unknowingly_to_syria_by FRENCH NEWS OUTLET SAYS US BEHIND FLAME ATTACKS ON SARKOZY STAFF COMPUTERS http://arstechnica.com/security/2012/11/french-fried-us-allegedly-hacked-sarkozys-office-with-fl http://threatpost.com/en_us/blogs/france-accuses-us-using-flame-malware-hack-presidents-networkhttp://www.theregister.co.uk/2012/11/21/us_flame_attack_elysee_palace_sarkozy/ http://www.zdnet.com/us-used-malware-and-facebook-to-hack-french-presidents-team-7000007725/ THE REAL IRANIAN THREAT: CYBERATTACKS http://money.cnn.com/2012/11/05/technology/security/iran-cyberattack/?source=cnn_bin SYRIA CUT OFF FROM INTERNET http://www.cnn.com/2012/11/28/world/meast/syria-civil-war/index.html?hpt=te_t1 http://www.nbcnews.com/technology/technolog/syria-drops-internet-1c7319908 http://www.zdnet.com/syria-suffers-internet-blackout-cut-off-from-the-outside-world-7000008100/ http://www.bbc.co.uk/news/technology-20546302 EXCHANGE 2013 ENHANCED EMAIL RETENTION, ARCHIVING, LEGAL HOLD, AND EDISCOVERY http://www.networkworld.com/community/node/81828 INTERNET EVIDENCE FINDER ADDS PICTURE AND VIDEO ANALYSIS http://www.forensicfocus.com/news/article/sid=1958/ LEGGI, DOTTRINA, GIURISPRUDENZA GARANTE PRIVACY: imprese ancora tutelate dal telemarketing http://www.garanteprivacy.it/web/guest/home/docweb/-/docweb-display/docweb/2094796 FISCO: ARCHIVIO RAPPORTI FINANZIARI, SÌ ALLE MODALITÀ PER LA TRASMISSIONE DEI DATI, MA IL GARANT http://www.garanteprivacy.it/web/guest/home/docweb/-/docweb-display/docweb/2099712 LINKS BLOGS & PORTALS http://www.forensicfocus.com/computer-forensics-blog http://articles.forensicfocus.com/ http://www.forensicblog.org http://windowsir.blogspot.com http://computer-forensics.sans.org/blog http://computer.forensikblog.de/en/ http://www.forensickb.com http://www.forensicinnovations.com/blog http://forensicsfromthesausagefactory.blogspot.com/ http://ericjhuber.blogspot.com/ http://consoleforensics.com/

http://www.forensicphotoshop.blogspot.com/ http://forensicmethods.com/ http://blog.digital-forensics.it/ http://f-interviews.com/ [ITA] http://pierluigiperri.com/ http://www.techandlaw.net/ http://xwaysclips.blogspot.it/ http://justaskweg.com/ http://memoryforensics.blogspot.it/ https://www.privacyinternational.org/ http://volatility-labs.blogspot.it/ [ITA] http://www.siig.it/ PODCASTS http://www.cybercrime101.com http://cyberspeak.libsyn.com http://forensic4cast.com/ <--- NEW WIKIS http://www.forensicswiki.org http://www.forensicwiki.com http://www.forensicswiki.org/wiki/scheduled_training_courses http://www.forensicswiki.org/index.php?title=upcoming_events http://cyber.law.harvard.edu/cybersecurity/cybersecurity_annotated_bibliography TOOLS http://www.opensourceforensics.org/ http://www.cftt.nist.gov/ http://computercrimeinfo.com/info.html http://www.mikesforensictools.co.uk/software.html http://regripper.wordpress.com/ http://code.google.com/p/regripperplugins/ http://www.mobileforensicscentral.com/mfc/ http://forensiccontrol.com/resources/free-software/ http://winfe.wordpress.com/ GOOGLE DIGITAL FORENSICS SEARCH http://www.google.com/cse/home?cx=011905220571137173365:7eskxxzhjj8 TOOLS DEFT 7.2 http://www.deftlinux.net/2012/10/23/deft-7-2-ready-for-download/ BLACKLIGT 2012 R4 https://www.blackbagtech.com/software-products/blacklight-1/blacklight.html RAPTOR - FORENSICS ACQUISITION http://forwarddiscovery.com/raptor ANDROID FORENSICS by viaforensics https://github.com/viaforensics/android-forensics MEMORYZE FOR MAC http://www.mandiant.com/resources/download/mac-memoryze TABLEAU IMAGER 1.2 http://www.tableau.com/index.php?pageid=products&model=tsw-tim PAPERS/TUTORIALS SOME PITFALLS OF INTERPRETING FORENSIC ARTIFACTS IN THE WINDOWS REGISTRY

http://www.youtube.com/watch?v=mc9alupvgru&feature=youtu.be NIST - DRAFT GUIDELINES ON HARDWARE-ROOTED SECURITY IN MOBILE DEVICES http://csrc.nist.gov/publications/pubsdrafts.html#sp-800-164 ANDROID MALWARE FORENSICS: RECONSTRUCTION OF MALICIOUS EVENTS http://loccs.sjtu.edu.cn/typecho/usr/uploads/2012/05/727967809.pdf icloud (IN)SECURITY EXAMINING ios DATA BACKED UP IN THE CLOUD https://viaforensics.com/android-forensics/icloud-insecurity-examining-ios-data-backup-cloud.htm ANDROID AND ios FORENSICS: PIN CRACKING, BACKUP RECOVERY, AND MORE https://viaforensics.com/iphone-forensics/android-ios-forensics-pin-encryption-cracking.html DIGITAL PHOTOGRAPHY AND SOCIAL NETWORKING ANTI-FORENSICS http://integriography.wordpress.com/2012/11/11/photograph-anti-forensics/ GEORGIA TECH - EMERGING CYBER THREAT REPORT 2013 http://www.gtsecuritysummit.com/pdf/2013threatsreport.pdf ios: UNDERSTANDING 'ERASE ALL CONTENT AND SETTINGS' http://support.apple.com/kb/ht2110 WINDOWS 8 AND WINDOWS SERVER 2012 SECURITY EVENT DETAILS http://www.microsoft.com/en-us/download/details.aspx?id=35753&wt.mc_id=rss_alldownloads_all WINDOWS 8 FORENSICS http://computerforensics.champlain.edu/blog/windows-8-forensics HOW TO REPORT A COMPUTER CRIME: SQL INJECTION WEBSITE ATTACK http://nakedsecurity.sophos.com/2012/11/15/computer-crime-sql-injection/ WHY SSD DRIVES DESTROY COURT EVIDENCE, AND WHAT CAN BE DONE ABOUT IT http://forensic.belkasoft.com/en/why-ssd-destroy-court-evidence FORMAZIONE SEMINARI "DIGITAL INVESTIGATION 2012" Aula 4 del Polo Cravino, Via Ferrata 1 - Pavia, dalle ore 16.00 alle ore 18.00. - 12 Dicembre 2012: Cloud computing e cloud investigation (Davide Gabrini) http://www.tipiloschi.net/drupal/?q=digital-investigation-2012-unipv-acquisizione-forense-digita CONFERENCES & CFP CDCP 2013 - THE 6th ANNUAL COMPUTERS, PRIVACY AND DATA PROTECTION CONFERENCE January 23-25, 2013, Brussels http://www.cpdpconferences.org/callforpapers.html#top NINTH ANNUAL IFIP WG 11.9 INTERNATIONAL CONFERENCE ON DIGITAL FORENSICS January 28-30, 2013 National Center for Forensic Science, University of Central Florida Orlando, Florida, USA Conference Deadlines: Paper/Panel Submission: October 15, 2012 Notification of Acceptance: November 15, 2012 IMF 2013-7TH INTERNATIONAL CONFERENCE ON IT SECURITY INCIDENT MANAGEMENT & IT FORENSICS March 12th - 14th, 2013 Nuremberg, Germany FORENSICS EUROPE EXPO April 24th 25th, 2013 Upper West Hall, Olympia, London

http://www.forensicseuropeexpo.com/ ADFSL 2013 CONFERENCE ON DIGITAL FORENSICS, SECURITY AND LAW June 10-12, 2013 Richmond, Virginia USA CfP deadline: 19 February 2012 http://www.digitalforensics-conference.org Newsletter a cura del Consiglio dell Associazione DFA - Digital Forensics Alumni. INFORMATIVA AI SENSI DELL ART. 13 DEL D.LGS. 196/2003 Digital Forensics Alumni in qualità di titolare del trattamento dei dati personali, informa che