Please turn on your JavaScript for this page to function normally.
Facebook Forensics

Facebook activities have grown in popularity along with its social networking site. However, many cases involve potential grooming offences in which the use of Facebook …

Security framework integrates forensics and data auditing

AccessData announced the initial release of its new integrated security framework, CIRT (Cyber Intelligence and Response Technology), and is inviting select government and …

Network forensics platform Solera OS 5.0 released

Solera Networks announced Solera OS 5.0, a major update to its network forensics platform. The new OS transforms network forensics, addressing the prevailing urgency IT …

New storage system for field forensic investigators

Guidance Software announced a new compact, easily transportable storage system that gives forensic investigators the storage capacity they need to handle large cases in the …

The shape of security and compliance in 2011

With increasingly stringent compliance mandates, a flurry of vendor consolidation, demands for audit reporting, and a spike in complex security breaches, 2010 has been a …

Mac forensics software gathers social networking evidence

MacForensicsLab Social Agent 1.0 is designed to get evidence from chats, private messages, and blog activity on Facebook (and other) social networking websites. Social Agent …

Real-time forensic search engine

eIQnetworks launched ForensicVue, the first real-time forensic search engine to provide security analysts with the ability to search every piece of security data on their …

Extract and analyze digital evidence from Mac OS X systems

ATC-NY released Mac Marshal 2.0 which automates the forensics process for a cyber investigator. It scans a Macintosh disk, automatically detects and displays Macintosh and …

Portable multi-boot security suite Katana 2.0 released

Katana is a portable multi-boot security suite which brings together all of the best security distributions to run from one USB drive. Katana includes distributions which …

Don't miss

Cybersecurity news