Wednesday, 25 February 2009

BCS Consultancy event Cybercrime Forensics

Date/Time:
Wednesday 4th March 2009, 6.00pm for 6.15pm (ends 9.30pm).

Venue:
BCS London Office, First Floor, The Davidson Building, 5 Southampton Street, London WC2E 7HA.

Speakers:

Peter Wood, Chief of Operations, First Base Technologies
Denis Edgar-Nevill, Head of the Department of Computing at Canterbury Christ Church University

PART 1

The new blended attack is social engineering plus technology. Criminal hacking is no longer a purely technical activity. Today organised crime uses every combination of technical, physical and human attacks to achieve its goals. Unless organisations understand how defend against attack on every front they will be hacked.

The approach of purchasing individual "silver bullet" solutions like firewalls, IDS and IPS must be replaced by an holistic view of security embracing technology, people and physical controls. Staff awareness of social engineering is particularly weak, leaving most organisations open to abuse both remotely and in person. Physical hacks such as key loggers and web cams are increasing, yet most organisations have no way to detect them. This presentation will open your mind to these new, blended attacks and offer ideas for defending against them.

PART 2
Part 2
Title: Cybercrime Forensics: Bringing together New Stakeholders to Tackle Computer Crime
Speaker: Denis Edgar-Nevill

Summary:

The problem of cybercrime has the potential to effect a greater number of people on Earth than any other form of criminal activity. The presentation will look at how Cybercrime Forensics has grown up as a new discipline bringing together specialists in police and law enforcement, computing, computer security, law, forensics, software/hardware development and business.

The British Computer Society has recognized its growth with the creation of the new national BCS Cybercrime Forensics SG which held its inaugural meeting in December 2008. The presentation will looking at the groups planned activities and how it can to bring together stakeholders to make a positive contribution addressing computer crime.

TO BOOK A TICKET FOR THE EVENT AT ONLY £17.00! CLICK ON THE LINK CYBERCRIME EVENT

M.Francis UK TASKFORCE

Friday, 20 February 2009

19-02-2009
just tested:

this new network security software from emailalarms:Corporate Network Security 2.5

It will Protect PC workstations over your network with Corporate Network Security. This network-based password-protected security software lets you impose access restrictions to all your PC workstations you have in your corporate network to stop users from tampering with them.

Also, it allows you to apply executable patches to your workstations remotely, and schedule reboots, shutdowns, and Windows Explorer restarts.

The workstations are controlled from a single administrator's computer from almost everywhere where you have access to the TCP/IP-based network or Internet.

Using Corporate Network Security you can do the following to your PC workstations: deny access to each individual component of several Control Panel applets,
including Display,
Network, Passwords,
Printers, System and Internet Options;
disable the boot keys,
context menus,
DOS windows,
Registry editing,
Internet and Network access;

hide desktop icons,
individual drives, Start menu items, and taskbar;
apply password protection to Windows and restrict users to running specific applications only,

Control Internet Usage and much more. In total, Corporate Network Security supports over 600 different security restrictions, options and tweaks that allow you to restrict access to almost every corner of Windows.

Free trial download from:

Corporate Network Security 2.5

best regards to all

Computer forensic Service

Wednesday, 4 February 2009

SPY + COMPUTER SPY SOFTWARE

Hi
i have just run tests on the new SPY+ Computer Spy software
and have to report how comprehensive i found it to be
------------
i first installed it in my own laptop , it took only seconds!
the interface is very user friendly and can allow the user to tweak its reporting
from 10 seconds to every hour
-------------
powerfull is an understatement when talking about this software
everything from colour screenshot, to login passwords is recorded
it will even send reports to your email address if you so wish
-------------
using 3 key stroke to enter and covert button to hide it could not be easier to use
-------------
and at a one off price not many can beat
oh yes and you are not limited to 1 machine it can be installed on as many as you wish...how about that! in this day and age when and software never mind spy software
is usually restricted to one licence only SPY+ software is a real rarity
here in the UK it is only available by download from
SURVEILLANCE ZONE One of the best spy equipment sites i've found.

Sunday, 1 February 2009

newtork security budgets increasing worldwide

Compliance, data leakage and privacy issues, along with the need to tackle the fast evolving and sophisticated threat environment, are among the major drivers fuelling the growth of spending on security.

Cisco said that one of the main drivers behind the increase is financial losses from attacks on corporate networks and employees, including those who work outside the office.

The study suggests that risky behaviour from remote workers, such as opening suspicious emails, hijacking wireless networks or sharing corporate devices with non-employees, is much more extensive in China, India and Brazil than in nations with a longer history of corporate internet use.

SECURITY SOFTWARE REVIEW

Welcome to Security software review

on these pages i will endeavour to offer you a straightforward explanation of internet security software and computer security sofwtare together with thier strengths and weaknesses.

Firstly Newtork Security software protects corporate intranet and internet networks ( including wireless networks ) from malicious attacks from outside the nework itself
i.e. from hackers.

The systems work very well up to a point in that they will discourage the hobbyist hacker but they will not deter a criminal attackers who may be after lucrative information, such as credit card numbers , card payment packets, bank account details of staff e.t.c.

Some of the best network security software packages even attempt to hack the hackers system and also log i.p. addresses McAfee anti virus software Total protection 2009
actively blocks all these attacks and gives a thorough report to the user.

For user friendly platform combined with true security performance it cannot be beaten