Category Archives: Computer Forensic Investigation

Stuff to do with the BSc (Hons) Computer Forensic Investigation course.

The 9th International Workshop on Digital Forensics

WSDF 2016 to be held at ARES conference, 31/08-02/09 2016, in Salzburg, Austria.

Posted in Computer Forensic Investigation, Cybercrime | Leave a comment

JDFSL Special issue on Cyberharassment Investigation: Advances and Trends.

Please find the CFP here

Posted in Computer Forensic Investigation, Cybercrime | Leave a comment

Computer Forensic Investigation timetables for fall 2013

Hola! Here are timetables for CFI for the fall 2013 semester. Enjoy! http://computing.derby.ac.uk/~dfe/f490_y1_f_timetable.pdf http://computing.derby.ac.uk/~dfe/f490_y2_f_timetable.pdf http://computing.derby.ac.uk/~dfe/f490_y3_f_timetable.pdf

Posted in Computer Forensic Investigation, David Evans | Leave a comment

South Korea Cyber Attack

There are some very interesting aspects to this recent attack. The following links provide some early analysis of the basis for the attack http://blogs.csoonline.com/malwarecybercrime/2628/symantecs-research-south-korean-attacks-more-detail http://www.symantec.com/connect/blogs/south-korean-banks-and-broadcasting-organizations-suffer-major-damage-cyber-attack One particular unusual aspect is the Linux codes within the Windows version of the software.

Posted in Computer Forensic Investigation, Cybercrime, Richard Self, Security | Leave a comment

Research Posters in Computer Forensic Investigation

The second year CFI students demonstrated their research work in a poster session, which was organised as part of their assessment for the Digital Forensic Investigation module in Autumn 2012.  

Posted in Computer Forensic Investigation | Leave a comment

Digital Crime Scene

This gallery contains 12 photos.

We set up a mock credit card crime scene in our digital forensics lab for the second year students. The students came in contact with the crime scene, collected evidence and completed the necessary paperwork as part of this practical … Continue reading

More Galleries | Leave a comment

Facebook Graph Search, Privacy Settings and User Education

The following CSO Online story raises interesting questions about Ethics and security. http://www.csoonline.com/article/727502/facebook-s-graph-search-worries-security-experts The Facebook perspective is that Users need to be responsible for their own settings, even though managing settings is not intuitive and is difficult to find. Security … Continue reading

Posted in Computer Forensic Investigation, Governance, Richard Self, Security | Tagged , | Leave a comment

Growing Demand for Computer Forensics Expertise and Rising Salaries

See this little article from the BCS http://www.bcs.org/content/conWebDoc/49567  

Posted in Computer Forensic Investigation, Employment Prospects, Richard Self | Tagged , | Leave a comment

CSO Updates for Cybercrime

A couple of interesting items from today’s online email Distributed Spam Distraction (DSD) technique http://www.csoonline.com/article/727439/flood-of-spam-email-it-may-be-a-screen-for-fraud Value of Forensics http://www.csoonline.com/article/727438/gozi-malware-arrests-report-highlight-russian-cybercrime

Posted in Computer Forensic Investigation, Governance, Information Technology, Richard Self, Security | Tagged , | Leave a comment

In first year and confused by timetables?

Are you in first year on a course in the CS Scheme (CS, CGP, N&S, CFI) and are the online timetables getting you down? Check out http://computing.derby.ac.uk/~dfe/ComputerScience_Year1_Spring.pdf It is for week 1 only as it lacks tutorials but it should get … Continue reading

Posted in Computer Forensic Investigation, Computer Games Programming, Computer Science, David Evans | Leave a comment