\\\\\\\\\\\\ DIGITAL FORENSICS ALUMNI //////////// Newsletter 34 - Marzo/Aprile 2014 \\\\\\\\\\\\\\\\\\\\\\\\\/////////////////////////



Similar documents
CHROME 23 INCLUDES DO NOT TRACK OPTION

NATIONWIDE INSURANCE NETWORK BREACH AFFECTS ONE MILLION

LA FARNESINA 'BUCATA' DAGLI HACKER

AUSTRALIA'S PRIVACY COMMISSIONER TELLS GOOGLE TO DESTROY STREETVIEW PAYLOAD DATA

ARRIVA IL PRIMO BANCOMAT BITCOIN IN ITALIA

TOR: L'FBI SI INFILTRA E ARRESTA UN PEDOFILO

\\\\\\\\\\\\ DIGITAL FORENSICS ALUMNI //////////// Newsletter 36 - Luglio/Agosto 2014 \\\\\\\\\\\\\\\\\\\\\\\\\/////////////////////////

TRATTAMENTI DATI PER ATTIVITÀ DI PROPAGANDA ELETTORALE - ESONERO DALL'INFORMATIVA


Intothe Eyeof the Twister 19 Oct2012

INDUSTRY OVERVIEW: HEALTHCARE

SENTENZA DELLA CORTE DI CASSAZIONE: L'INVIO DI NON INTEGRA IL REATO DI MOLESTIE EX ART. 66

\\\\\\\\\\\\ DIGITAL FORENSICS ALUMNI //////////// Newsletter 13 - Dicembre 2011 \\\\\\\\\\\\\\\\\\\\\\\\\/////////////////////////

A Case for Managed Security

Crosscheck Web Services Patent Pending Automated SOA Compliance and Security Assessment

2012 Data Breach Investigations Report

This session was presented by Jim Stickley of TraceSecurity on Wednesday, October 23 rd at the Cyber Security Summit.

Cyber Security in Taiwan's Government Institutions: From APT To. Investigation Policies

INDUSTRY OVERVIEW: FINANCIAL

COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM

Who Drives Cybersecurity in Your Business? Milan Patel, K2 Intelligence. AIBA Quarterly Meeting September 10, 2015

Certified Cyber Security Analyst VS-1160

Encyclopedia of Information Assurance Suggested Titles: March 25, 2013 The following titles have not been contracted.

CRYPTUS DIPLOMA IN IT SECURITY

Hong Kong Information Security Outlook 2015 香 港 資 訊 保 安 展 望

Christos Douligeris cdoulig at unipi dot gr. Department of Informatics University of Piraeus

Secure Your Mobile Workplace

FORBIDDEN - Ethical Hacking Workshop Duration

Digital Identity & Authentication Directions Biometric Applications Who is doing what? Academia, Industry, Government

KEY STEPS FOLLOWING A DATA BREACH

What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.

With Great Power comes Great Responsibility: Managing Privileged Users

Myths and Facts about the Cyber Intelligence Sharing and Protection Act (CISPA)

Marble & MobileIron Mobile App Risk Mitigation

Joint Universities Computer Centre Limited ( JUCC ) Information Security Awareness Training - Session One

Cyber Security 2014 SECURE BANKING SOLUTIONS, LLC

2012 Bit9 Cyber Security Research Report

Property of Secure Network Technologies-Do Not Distribute or Post Without Written Permission-Copyrights and Trademark Apply

Risks and Countermeasures in the Public Cloud

CSIS/DOJ Active Cyber Defense Experts Roundtable March 10, 2015

How Security Testing can ensure Your Mobile Application Security. Yohannes, CEHv8, ECSAv8, ISE, OSCP(PWK) Information Security Consultant

Incident Response. Six Best Practices for Managing Cyber Breaches.

Loophole+ with Ethical Hacking and Penetration Testing

Industrial Control Systems Security. Denny Gregianin_Sales Area Manager

MOBILE SECURITY: DON T FENCE ME IN

The Value of Physical Memory for Incident Response

Research Topics in the National Cyber Security Research Agenda

Applying the 80/20 approach for Operational Excellence. How to combat new age threats, optimize investments and increase security.

IT Security Quo Vadis?

Specific recommendations

What s Lurking in Your Network & The Business Impact of Data Breaches. Colby Clark Director of Incident Management FishNet Security

Anatomy of a Breach: A case study in how to protect your organization. Presented By Greg Sparrow

Security Intelligence Services.

EMERGING THREATS & STRATEGIES FOR DEFENSE. Stephen Coty Chief Security

CYBER LIABILITY. Bring on tomorrow. Network Security and Privacy. May 15, 2014

The FBI Cyber Program. Bauer Advising Symposium //UNCLASSIFIED

Dall Information Security alla Cyber Security, e ritorno

Advanced Visibility. Moving Beyond a Log Centric View. Matthew Gardiner, RSA & Richard Nichols, RSA

KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES.

Penetration Test Methodology on Information-Security Product Utilizing the Virtualization Technology

Rethinking Cyber Security in the Age of the Breach

High End Information Security Services

Presented by Evan Sylvester, CISSP

SCADA / Smart Grid Security Who is really in control of our Control Systems?

24/7 Visibility into Advanced Malware on Networks and Endpoints


DTI / Titolo principale della presentazione IPHONE ENCRYPTION. Litiano Piccin. 11 ottobre 2014

Guidelines. London School of Economics & Political Science. Remote Access and Mobile Working Guidelines. Information Management and Technology

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)

Beyond the Box: A Strategic Approach Against APTs

Panel Title: Data Breaches: Industry and Law Enforcement Perspectives on Best Practices

"This is a truly remarkable attack, but not. just in its scope hackers successfully. penetrated one of the most secure

CYBERSECURITY NEXUS CSX. 15 October 2014 ISACA Winchester Chapter

Surviving the Era of Hack Attacks Cyber Security on a Global Scale

Mobile Security Framework; Advances in Mobile Governance in Korea. TaeKyung Kim

Linux and Law Enforcement

Information Security. CS526 Topic 1

FACT SHEET: Ransomware and HIPAA

FORENSIC ANALYSIS Aleš Padrta

THE SMARTEST WAY TO PROTECT WEBSITES AND WEB APPS FROM ATTACKS

Sicurezza Data Center 22 giugno Fabio Paravani Regional Account Manager

Belmont Savings Bank. Are there Hackers at the gate? 2013 Wolf & Company, P.C.

Cyber - Security and Investigations. Ingrid Beierly August 18, 2008

Practice Good Enterprise Security Management. Presented by Laurence CHAN, MTR Corporation Limited

Cyber Risks in the Boardroom

CryptoLocker la punta dell iceberg, impariamo a difenderci dagli attacchi mirati. Patrick Gada 18 March 2015 Senior Sales Engineer

Privacy and data protection in a post-snowden world. Carly Nyst Head of International Advocacy

(U)SimMonitor: A New Malware that Compromises the Security of Cellular Technology and Allows Security Evaluation

DATA SHEET. What Darktrace Finds

12 Security Camera System Best Practices - Cyber Safe

It s 2 o clock: Who Has Your Data? Josh Krueger Chief Technology Officer Integrity Technology Solutions

Detailed Description about course module wise:

Security Awareness. ITS Security Training. Fall 2015

CYBERSECURITY HOT TOPICS

Security A to Z the most important terms

DDoS Attacks: The Latest Threat to Availability. Dr. Bill Highleyman Managing Editor Availability Digest

WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY

Security Intelligence Services. Cybersecurity training.

Transcription:

\\\\\\\\\\\\ DIGITAL FORENSICS ALUMNI //////////// Newsletter 34 - Marzo/Aprile 2014 \\\\\\\\\\\\\\\\\\\\\\\\\///////////////////////// Indice: 1 - News 2 - Leggi, Dottrina, Giurisprudenza 3 - Papers/Tutorials 4 - Tools 5 - Formazione 6 - Conferences e Call for Papers 7 - Links ************************************************** DFA OPEN DAY 2014 5 giugno 2014 Milano Argomenti: OSINT e Investigazioni Digitali e Security e Incident Response aziendale Ingresso gratuito. http://dfaopenday2014.eventbrite.it/ NEWS IO NON CRAKKO LE PASSWORD! LE SO: RILASCIATO MIMIKATZ OFFLINE http://mattiaep.blogspot.it/2014/03/io-non-crakko-le-password-le-so.html CORTE UE RIDIMENSIONA IL CONTROLLO DEI DATI TELEMATICI, MA SI RISCHIA UN VUOTO NORMATIVO http://www.wired.it/internet/regole/2014/04/08/ue-corte-di-giustizia-data-retention-dati-personali-privacy/ icloud: PANORAMICA SULLA SICUREZZA E SULLA PRIVACY IN icloud http://support.apple.com/kb/ht4865?viewlocale=it_it&locale=it_it DERUBATO DEL COMPUTER ATTIVA LA WEBCAM E METTE ONLINE LE FOTO DEL LADRO. http://www.ilmessaggero.it/primopiano/esteri/pablo_mac_computer_rubato_turista_usa/notizie/563984.shtml FOTO A VENEZIA CON IPAD RUBATO, SCOPERTO http://www.ansa.it/lombardia/notizie/2014/04/22/foto-a-venezia-con-ipad-rubato-scoperto_8f61503f-c61c-42f6- RAPPORTO CLUSIT 2014 DISPONIBILE http://clusit.it/rapportoclusit/ MULTA A GOOGLE PER STREET VIEW http://www.lastampa.it/2014/04/03/tecnologia/multa-a-google-per-street-view-8wvap7sgfq4ixvvoiiqfen/pagina.h http://www.garanteprivacy.it/web/guest/home/docweb/-/docweb-display/docweb/2954309 IL MALWARE CRYPTODEFENSE CIFRA I DATI DIMENTICANDO LA CHIAVE SUL PC http://attivissimo.blogspot.it/2014/04/cryptodefense-cifra-i-dati-delle-sue.html CRYPTODEFENSE, THE CRYPTOLOCKER IMITATOR, MAKES OVER $34,000 IN ONE MONTH http://www.symantec.com/connect/blogs/cryptodefense-cryptolocker-imitator-makes-over-34000-one-month HIDDEN SIGNATURE IN ONLINE PHOTOS COULD HELP NAB CHILD ABUSERS http://www.scientificamerican.com/article/hidden-signature-in-online-photos-could-help-nab-child-abusers/ 40 MILLION STOLEN CREDIT CARD NUMBERS: HOW THE TARGET BREACH HAPPENED http://www.businessweek.com/articles/2014-03-13/target-missed-alarms-in-epic-hack-of-credit-card-data EU LEGISLATORS APPROVE NEW CYBERSECURITY LAW http://www.networkworld.com/news/2014/031314-new-eu-cybersecurity-law-avoids-279681.html EU DATA RETENTION DIRECTIVE RULED INVALID http://www.bbc.com/news/world-europe-26935096 http://www.irishtimes.com/business/sectors/technology/european-court-declares-data-retention-directive-inva NSA'S PLANS REPORTEDLY INVOLVE INFECTING MILLIONS OF COMPUTERS WITH SURVEILLANCE MALWARE

http://www.networkworld.com/news/2014/031214-nsa39s-plans-reportedly-involve-infecting-279666.html?source=n NSA INFILTRATED HUAWEI NETWORKS, INSTALLED BACKDOORS http://www.nytimes.com/2014/03/23/world/asia/nsa-breached-chinese-servers-seen-as-spy-peril.html?_r=0 http://www.zdnet.com/nsa-spies-on-china-networking-giant-huawei-7000027599/ WHITE HOUSE CALLS ON LAWMAKERS TO END NSA BULK METADATA COLLECTION http://www.washingtonpost.com/world/national-security/white-house-pushes-congress-to-quickly-pass-changes-t http://www.nytimes.com/2014/03/25/us/obama-to-seek-nsa-curb-on-call-data.html?hp&_r=0 http://arstechnica.com/tech-policy/2014/03/white-house-to-propose-law-to-end-nsa-bulk-collection-of-phone-d CRIMINAL GROUP OF ONLINE FRAUDSTER DISMANTLED https://www.europol.europa.eu/content/criminal-group-online-fraudsters-dismantled EU COURT OF JUSTICE RULES AGAINST DATA RETENTION DIRECTIVE http://www.siliconrepublic.com/enterprise/item/36422-eu-court-of-justice-rules/ [ITA] http://www.wired.it/attualita/politica/2014/04/08/data-retention-corte-di-giustizia/ RUSSIA vs ITALY OVER COPYRIGHT VIOLATIONS http://www.techandlaw.net/news/russia-v-italy-copyright-violations.html NIST REMOVES CRYPTOGRAPHY ALGORITHM FROM RANDOM NUMBER GENERATOR RECOMMENDATIONS http://www.nist.gov/itl/csd/sp800-90-042114.cfm NEW ANDROID BITCOIN MINING MALWARE FOUND ON GOOGLE PLAY http://www.esecurityplanet.com/mobile-security/new-android-bitcoin-mining-malware-found-on-google-play.html MASSIVE COLLECTION OF LEAKED PASSWORDS http://www.cyberwarzone.com/free-leaked-password-files DEMYSTIFYING POINT OF SALE MALWARE AND ATTACKS http://www.symantec.com/connect/blogs/demystifying-point-sale-malware-and-attacks ANDROID BOTNET TARGETS MIDDLE EAST BANKS http://krebsonsecurity.com/2014/04/android-botnet-targets-middle-east-banks/ BITCOIN MINING MALWARE FOUND ON SURVEILLANCE CAMERA DVRS http://threatpost.com/dvr-infected-with-bitcoin-mining-malware/105167 POLICE HID USE OF CELL PHONE TRACKING DEVICE FROM JUDGE BECAUSE OF NDA http://arstechnica.com/tech-policy/2014/03/police-hid-use-of-cell-phone-tracking-device-from-judge-because- EDWARD SNOWDEN SPEAKS AT SOUTH BY SOUTHWEST CONFERENCE http://www.washingtonpost.com/world/national-security/snowden-mass-surveillance-is-backfiring-on-us-in-effo http://www.wired.com/threatlevel/2014/03/edward-snowdens-tech-call-arms/ http://www.darkreading.com/vulnerability/snowden-encryption-is-defense-against-th/240166547 THE IMPORTANCE OF FORENSIC TOOLS VALIDATION http://www.zdziarski.com/blog/?p=3112 THE IMPORTANCE OF COMMAND AND CONTROL ANALYSIS FOR INCIDENT RESPONSE http://digital-forensics.sans.org/blog/2014/03/31/the-importance-of-command-and-control-analysis-for-incide REX VS THE ROMANS ANTI HACKING TEAM KERNEL EXTENSION http://reverse.put.as/2014/04/08/rex-vs-the-romans-anti-hacking-team-kernel-extension/ MALWARE STEALS APPLE ID CREDENTIALS FROM JAILBROKEN IOS DEVICES http://arstechnica.com/security/2014/04/active-malware-campaign-steals-apple-passwords-from-jailbroken-ipho -------------------------------- THE HEARTBLEED SAGA -------------------------------- HEARTBLEED VULNERABILITY IN OPENSSL CRYPTOGRAPHIC LIBRARY http://www.theregister.co.uk/2014/04/08/running_openssl_patch_now_to_fix_critical_bug/ http://www.zdnet.com/heartbleed-serious-openssl-zero-day-vulnerability-revealed-7000028166/ http://arstechnica.com/security/2014/04/critical-crypto-bug-in-openssl-opens-two-thirds-of-the-web-to-eaves http://heartbleed.com CONFIRMED: NASTY HEARTBLEED BUG EXPOSES OPENVPN PRIVATE KEYS, TOO http://arstechnica.com/security/2014/04/confirmed-nasty-heartbleed-bug-exposes-openvpn-private-keys-too/ NSA DENIES IT KNEW ABOUT HEARTBLEED VULNERABILITY http://www.scmagazine.com/heartbleed-bug-not-leveraged-for-surveillance-nsa-says/article/342579/

http://www.cnet.com/news/nsa-denies-it-knew-of-exploited-heartbleed-kept-flaw-secret/ LAVABIT CASE SUPPORTS NSA'S ASSERTION THAT THEY DID NOT HAVE HEARTBLEED http://www.zdnet.com/lavabit-case-undermines-claims-nsa-had-heartbleed-early-7000028517/ RESEARCHERS SAY HEARTBLEED NOT EXPLOITED BEFORE DISCLOSURE http://bits.blogs.nytimes.com/2014/04/16/study-finds-no-evidence-of-heartbleed-attacks-before-the-bug-was-e OPENSSL HEARTBLEED: BLOODY NOSE FOR OPEN-SOURCE BLEEDING HEARTS http://www.theregister.co.uk/2014/04/11/openssl_heartbleed_robin_seggelmann/ TECH GIANTS, CHASTENED BY HEARTBLEED, FINALLY AGREE TO FUND OPENSSL http://arstechnica.com/information-technology/2014/04/tech-giants-chastened-by-heartbleed-finally-agree-to- LEGGI, DOTTRINA, GIURISPRUDENZA TRASMETTERE I FILE AZIENDALI ALL AVVOCATO: NON GIUSTIFICA IL LICENZIAMENTO http://www.laleggepertutti.it/47897_trasmettere-i-file-aziendali-allavvocato-non-giustifica-il-licenziament Cassazione: per un post non si può oscurare un blog http://247.libero.it/rfocus/20017946/1/cassazione-per-un-post-non-si-pu-oscurare-un-blog-udine-20/ Cassazione: è diffamazione parlar male su Facebook anche senza fare nomi http://www.repubblica.it/cronaca/2014/04/16/news/cassazione_diffamazione_su_facebook_anche_senza_fare_nomi- Crimini informatici: identità personale VS identità digitale http://www.altalex.com/index.php?idnot=66989 Regole tecniche: protocollo e conservazione digitale http://www.agid.gov.it/notizie/protocollo-conservazione-digitale-gazzetta-le-nuove-regole-tecniche Dlgs 21/2014 - Contratti a distanza e Codice del consumo http://www.altalex.com/index.php?idu=264948&cmd5=021c46ab76df2fd7050bbc8c56ed7fe1&idnot=66790 http://www.filodiritto.com/contratti-tra-consumatori-e-professionisti-litalia-recepisce-la-direttiva-europe Regolamento Agcom diritto d'autore online http://www.marchiebrevettiweb.it/29-diritto-di-autore/2397-entra-in-vigore-oggi-il-regolamento-per-la-tutel https://www.ddaonline.it Direttiva UE Network and Information Security (NIS) http://www.networkworld.com/news/2014/031314-new-eu-cybersecurity-law-avoids-279681.html PAPERS/TUTORIALS 2014 DATA BREACH INVESTIGATIONS REPORT http://www.verizonenterprise.com/dbir/2014/insider/ REVERSE ENGINEERING FOR BEGINNER http://yurichev.com/writings/re_for_beginners-en.pdf RUSSIAN UNDERGROUND ECONOMY REVISITED http://www.trendmicro.com/cloud-content/us/pdfs/security-intelligence/white-papers/wp-russian-underground-r PE INJECTION EXPLAINED http://packetstorm.interhost.co.il/papers/general/pe_injection_explained.pdf DLL SIDE-LOADING: A THORN IN THE SIDE OF THE ANTI-VIRUS INDUSTRY http://www.fireeye.com/resources/pdfs/fireeye-dll-sideloading.pdf?utm_content=buffere220a&utm_medium=social JTAG GALAXY SIII http://forensicfocus.files.wordpress.com/2014/03/jtag-galaxy_siii_4_31.pdf KINDLE PAPERWHITE EXPLORATORY FORENSICS

https://www.dropbox.com/s/weoar0khn1kz10z/forensicspaperfinaldraft.pdf A FORENSIC EXAMINER'S GUIDE TO GOOGLE GLASS http://desautelsja.blogspot.it/2014/04/a-forensic-examiners-guide-to-google.html [ITA] LE FRODI NELLA RETE http://frodi.clusit.it/_files/le_frodi_nella_rete.pdf WINDOWS 8 FORENSIC GUIDE http://propellerheadforensics.files.wordpress.com/2012/05/thomson_windows-8-forensic-guide2.pdf [ITA] CLOUD FORENSICS http://mattiaep.blogspot.it/2014/04/pubblicata-la-mia-presentazione-su.html MIMIKATZ OFFLINE - DUMPING PASSWORD IN WINDOWS HIBERNATION FILE http://blog.digital-forensics.it/2014/03/et-voila-le-mimikatz-offline.html http://blog.digital-forensics.it/2014/03/mimikatz-offline-addendum_28.html OSX 10.9 MEMORY ACQUISITION http://rekall-forensic.blogspot.de/2014/03/osx-109-memory-acquisition.html TOOLS FOR ANALYZING STATIC PROPERTIES OF SUSPICIOUS FILES ON WINDOWS http://digital-forensics.sans.org/blog/2014/03/04/tools-for-analyzing-static-properties-of-suspicious-files APT ATTRIBUTIONS AND DNS PROFILING http://espionageware.blogspot.hk/2014/04/apt-attributions-and-dns-profiling.html SIGNATURE DETECTION WITH CROWDRESPONSE http://digital-forensics.sans.org/blog/2014/04/09/signature-detection-with-crowdresponse# NEOPOCKET: A NEW ATM MALWARE http://securityblog.s21sec.com/2014/04/neopocket-new-atm-malware.html?utm_source=twitterfeed&utm_medium=twi MO SHELLS MO PROBLEMS: WEB SERVER LOG ANALYSIS http://forensicmethods.com/webshell-log-analysis THUNDERBIRD PARSER http://az4n6.blogspot.it/2014/04/whats-word-thunderbird-parser-that-is.html TOOLS MIMIKATZ OFFLINE https://googledrive.com/host/0b73hzlpvafuzn3hyvunxvi1ov1k/ ELCOMSOFT FORENSIC DISK DECRYPTOR http://www.elcomsoft.com/efdd.html W3AF - WEB APPLICATION ATTACK AND AUDIT FRAMEWORK http://w3af.org/ DEFT 8.1 http://www.deftlinux.net/download/ DEFT 8.1 Virtual appliance http://www.deftlinux.net/2014/04/24/deft-8-1-virtual-appliance-ready-for-download/ PEFRAME - STATIC MALWARE ANALYSIS https://github.com/guelfoweb/peframe RAGPICKER MALWARE CRAWLER https://code.google.com/p/malware-crawler/ MANTARAY 1.3 http://mantarayforensics.com/ https://github.com/mantarayforensics/mantaray https://launchpad.net/~mantaray/+archive/stable

FACEBOOK CHAT EXTRACTOR V1.2 http://www.gaetanoconsalvo.it/facebook%20chat%20extractor.html FORMAZIONE SANS ICS/SCADA SECURITY ESSENTIALS 12-16 May, 2014 London, United Kindom http://www.sans.org/event/ics-london-2014?utm_source=e-mail&utm_medium=invite&utm_content=20140218_emea_ics SANS HACKER TECHNIQUES, EXPLOITS & INCIDENT HANDLING 16-21 June, 2014 Milan, Italy http://www.sans.org/event/sans-milan-2014 CONFERENCES & CFP DFA OPEN DAY 2014 5 June, 2014 Milano, Italy Argomenti: OSINT e Investigazioni Digitali e Security e Incident Response aziendale Ingresso gratuito. http://www.perfezionisti.it/proposte-formative/dfa-open-day-2014/ http://dfaopenday2014.eventbrite.it/ SANS "HACKER TECHNIQUES, EXPLOITS & INCIDENT HANDLING" 16-21 June, 2014 Milano, Italy http://www.sans.org/event/sans-milan-2014 NOTA: per codice sconto 10% scrivere a pasquale.stirparo@sefirtech.com o mattia.epifani@realitynet.it ICDF2C - 6TH INTERNATIONAL CONFERENCE ON DIGITAL FORENSICS & CYBER CRIME September 18 20, 2014 New Haven, Connecticut, USA http://d-forensics.org/2014/show/home CLOUD SECURITY ALLIANCE EMEA CONGRESS 2014 19-20 November, 2014 Parco dei Principi Grand Hotel & Spa, Rome LINKS BLOGS & PORTALS http://www.forensicblog.org http://www.forensicfocus.com/computer-forensics-blog http://articles.forensicfocus.com/ http://computer-forensics.sans.org/blog http://computer.forensikblog.de/en/ http://windowsir.blogspot.com http://www.forensickb.com http://www.forensicinnovations.com/blog http://forensicsfromthesausagefactory.blogspot.com/ http://ericjhuber.blogspot.com/ http://consoleforensics.com/ http://www.forensicphotoshop.blogspot.com/ http://forensicmethods.com/ http://blog.digital-forensics.it/ http://f-interviews.com/

http://www.techandlaw.net/ http://xwaysclips.blogspot.it/ http://justaskweg.com/ http://memoryforensics.blogspot.it/ https://www.privacyinternational.org/ http://volatility-labs.blogspot.it/ [ITA] http://www.siig.it/ [ITA] http://pierluigiperri.com/ [ITA] http://blog.cesaregallotti.it [ITA] http://mattiaep.blogspot.it <--- NEW PODCASTS http://www.cybercrime101.com http://cyberspeak.libsyn.com http://forensic4cast.com/ WIKIS http://www.forensicswiki.org http://www.forensicwiki.com http://www.forensicswiki.org/wiki/scheduled_training_courses http://www.forensicswiki.org/index.php?title=upcoming_events http://cyber.law.harvard.edu/cybersecurity/cybersecurity_annotated_bibliography TOOLS http://www.opensourceforensics.org/ http://www.cftt.nist.gov/ http://computercrimeinfo.com/info.html http://www.mikesforensictools.co.uk/software.html https://code.google.com/p/regripper/ http://www.mobileforensicscentral.com/mfc/ http://forensiccontrol.com/resources/free-software/ http://winfe.wordpress.com/ GOOGLE DIGITAL FORENSICS SEARCH http://www.google.com/cse/home?cx=011905220571137173365:7eskxxzhjj8 Newsletter a cura del Consiglio dell Associazione DFA - Digital Forensics Alumni. INFORMATIVA AI SENSI DELL ART. 13 DEL D.LGS. 196/2003 Digital Forensics Alumni in qualità di titolare del trattamento dei dati personali, informa che i dati conf