skip to main | skip to sidebar
counter
free counter

Search

About me

muhammad abbas
View my complete profile

Archivo del blog

  • ▼ 2009 (113)
    • ► June (11)
    • ▼ April (28)
      • NAB: Digital Rapids enhances C2, announces MediaMesh
      • Ifbyphone offers carriers value-add services via S...
      • 4G race is more complex than many realize
      • YouTube signs premium content deals
      • NAB: GulfPines chooses Falcon, Verimatrix
      • Nortel soldiers on with carrier VoIP
      • Latest Offer From Virgin: Pink Slip Protection Plan
      • Ballmer, IBM reportedly surprised by Oracle-Sun deal
      • Oracle gets Sun for $7.4 billion, MySQL for $0
      • Oracle buys integration challenge along with Sun
      • Video game industry sales finally take a hit
      • Swedish antipiracy law: Traffic down, ISP rebels
      • Tech layoffs: The scorecard
      • How Charter Communications warns accused file sharers
      • QuickLogic Chooses Memory From Micron Technology T...
      • TELES announces integrated Class 4 Solution in 1U ...
      • VOIPIAN.com offers 1 Cent VoIP Calls to 60 Countri...
      • InfoCom says Japanese VoIP channels to reach just ...
      • XO Ethernet more incremental bandwidth added
      • How Hackers Try to Foil Forensic Investigations
      • Level 3 New Wavelength Services
      • Cisco launches new partner channel network
      • MegaPath gets Cisco Powered designations
      • France Telecom Loses Antitrust Appeal at European ...
      • First European airlines offering in-flight use of ...
      • Group urges FCC to open AT&T’s 3G to Skype on iPhone
      • VoIP Providers Call On EU To Ensure Free Access
      • Orange Business Services More Than Doubles Capacit...
    • ► March (52)
    • ► February (22)

Telecom

How Hackers Try to Foil Forensic Investigations

Saturday, April 4, 2009


Using actual data-breach cases, one of Verizon Business’ top forensic experts will explain how hackers try to cover their tracks, and how investigators combat these tricks and unmask the hackers.

Novak, a top forensic expert with Verizon Business, will discuss one of the hottest hacker trends — anti-forensics — which is an attempt to deliberately compromise the integrity of a crime scene, making forensic analysis after the fact difficult or impossible. Hackers use anti-forensic tools and techniques to hide evidence of their identity, source, or actions—anything that could lead to their exposure and subsequent capture.

WHEN: Wednesday, April 8, at 1 p.m. Eastern time

WHERE: Click on the link below to register for the complimentary webinar:
https://www.eventbuilder.com/event_desc.asp?z=r5a5t8&p_event=1×9q7u0b&eventid=1×9q7u0b&gateid=ebc

WHO: Chris Novak, a top forensic expert with Verizon Business, will revisit his popular 2008 RSA presentation, “How Criminals Manipulate Anti-Forensics to Foil the Crime Scene.”

The Verizon Business Forensics and Investigative Response team regularly sees anti-forensic techniques used in data compromises. According to Novak, anti-forensic tools are used in approximately two out of every three cases investigated.

In this webinar, participants will learn how to:

  • Recognize the changing landscape of computer forensics.
  • Identify whether new hacker methods are or were at play within forensic cases.
  • Discern various anti-forensic measures and build appropriate detection mechanisms or proactive defenses.
  • Choose the appropriate reactive means for handling various anti-forensic measures.
  • Evolve practice of forensics to better handle potential future anti-forensic measures.

Additionally, Novak will highlight how anti-forensic techniques have advanced in the last year, previewing the 2009 Data Breach Investigations Report, to be issued April 15.

Posted by muhammad abbas at 6:53 AM  

0 comments:

Post a Comment

Newer Post Older Post Home
Subscribe to: Post Comments (Atom)

Blog Design by Gisele Jaquenod

Work under CC License

Creative Commons License