±Forensic Focus Partners

Become an advertising partner

±Your Account


Forgotten password/username?

Site Members:

New Today: 1 Overall: 29233
New Yesterday: 11 Visitors: 110

±Follow Forensic Focus

Forensic Focus Facebook PageForensic Focus on TwitterForensic Focus LinkedIn GroupForensic Focus YouTube Channel

Subscribe to news

Subscribe to forums

XRY v6.15 Is Launched

Friday, October 09, 2015 (13:19:14)
XRY the pioneering mobile forensics tool from MSAB has just been updated to version 6.15

With support for the latest Apple iPhone 6s and 6s Plus devices, iOS9 and also Android 6 Marshmallow operating systems, to ensure digital forensic examiners can stay ahead.

XRY v6.15 has 16,463 mobile forensic profiles supported; including 847 of the latest smartphone app versions; such as WhatsApp (2.12), Snapchat (9.15) and Facebook Messenger (38.0) to list just a few of the apps supported.

Secure View Increases Advanced Analytics

Thursday, October 08, 2015 (14:57:50)
Secure View 4 adds new and advanced analytics to their suite of mobile forensic analytical tools, including deep Deleted Data acquisitions, pincode/passcode breaking and multi-link analysis. Grants are available.

Interview with Jamie Levy, Core Developer, Volatility Project

Thursday, October 08, 2015 (12:51:45)
Jamie, you’re currently working on the Volatility project. Tell us a bit more about the project and its aims.

The Volatility Framework is an open source project that allows people to analyze memory samples from various operating systems and hardware architectures. It's written in Python, which allows you to take advantage of the abundance of libraries that currently exist for forensic and reverse engineering purposes; this also allows you to run it from any operating system that has Python installed. Volatility allows you to view the memory sample as the operating system sees it (similar to WinDBG), but it also allows you to carve for objects in unallocated memory (that are inaccessible to traditional debuggers). Volatility has an easy to use API, so you can easily extend it to your needs and build custom plugins for new artifacts as well.

Read More
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (454 reads)

Oxygen Forensics Launches the New Oxygen Forensic® Detective

Thursday, October 08, 2015 (10:54:57)
Oxygen Forensics, the worldwide developer and provider of advanced forensic data examination tools for mobile devices, announced today the general availability of Oxygen Forensic® Detective, an all-in-one mobile forensic product that gives customers comprehensive data extraction and data analysis for mobile devices and cloud storage.

Nuix promotes international cybersecurity adviser Stuart Clarke to cyber-CTO

Wednesday, October 07, 2015 (14:32:56)
Nuix, a company that protects, informs, and empowers society in the knowledge age, today promoted internationally respected information security expert Stuart Clarke to the role of Chief Technology Officer for Cybersecurity.

Clarke joined Nuix in October 2013 as Director of Cybersecurity and Investigations. During his employment with Nuix, Clarke has advised the United Nations’ peak cybersecurity body ITU and provided cybersecurity training for over 60 computer emergency response teams from governments and regulators around the world. He also led the development of Nuix Incident Response, an innovative investigative tool that delivers deep insights into the cause and scope of data breaches.

Review - ReclaiMe Pro

Wednesday, October 07, 2015 (13:11:24)
I would be tempted to argue that you can tell a lot about a piece of software by how easy it is to install.

There are times when finding, downloading and installing a product update feels like repeatedly banging your head on a brick wall: constant freezing, confused Windows popups, license key errors...

Then there are times when you click 'Download', then 'Install', then tick 'Yes' in the little box, and boom! The software appears.

I am pleased to be able to report that the installation process of ReclaiMe Pro falls into the second category. It can be found on the Download page of the website, and it sets itself up in just a few minutes.

After that, of course, it's time to get down to business.

Read More
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (736 reads)

Advanced SQLite Analytics with Belkasoft Evidence Center (Part II)

Wednesday, October 07, 2015 (08:49:03)
In the first part of our series on SQLite analysis we talked about accessing corrupted SQLite files and recovering deleted SQLite records from the freelist. Today we will cover two more important topics: SQLite write-ahead log (WAL) and unallocated space of SQLite databases, and how to analyze them using Belkasoft Evidence Center.

FT Cyber Security Summit 2015 – Recap

Wednesday, September 30, 2015 (12:33:02)
This article is a recap of some of the main highlights from the FT Cyber Security Summit, which took place in London on Tuesday the 22nd of September 2015.

Conference Highlights

The day began with a keynote speech from Ed Vaizey MP, the UK Minister of State for Culture and the Digital Economy. Vaizey recapped some of the main things EU governments are doing to make cyberspace safer, praising the UK as a “pioneer of the digital age”. He discussed the Cyber Essentials scheme, through which the government helps businesses to create their own cyber security strategies, and also encouraged uptake of an initiative in which business owners can receive free training in cyber security.

Read More
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (1836 reads)

Training for HddSurgery data recovery tools

Wednesday, September 30, 2015 (09:21:09)
Another big novelty that we have decided to introduce this year, beside data recovery service, is a training for usage our data recovery tools. This idea emerged after numerous requests to provide specific course for clients who are newbies in data recovery.

We had a one-day pilot training in our offices (Belgrade, Serbia) in June, where we presented our tools and showed how to properly used them. We summarized the training in a blog article named HddSurgery data recovery tools training.

Interview with Cosimo Anglano, Professor, University of Piemonte Orientale

Wednesday, September 30, 2015 (05:56:23)
Cosimo, please tell us about your work as an Associate Professor at the Università del Piemonte Orientale. What does a typical day look like for you?

The University of Piemonte Orientale is a mid-sized University located in Piemonte, in the North-West of Italy. I work in the Computer Science Institute, which is located in Alessandria, one of the three campuses of the university.

As a Professor, my duties are research and teaching. My current research fields are digital forensics and distributed systems. My typical day consists in doing research in the lab (both directly and by coordinating my collaborators), mentoring students, and teaching. At the moment I teach classes in Digital Forensics, in Operating Systems, and in Distributed Systems, both at the undergraduate and at the graduate level.

Read More
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (1669 reads)