±Partners and Sponsors

±Your Account


Forgotten password/username?

New Today: 0
New Yesterday: 2
Overall: 26231
Visitors: 91

±Forensics Europe Expo

±Follow Forensic Focus

Join our LinkedIn group

Subscribe to news

Subscribe to forums

Subscribe to blog

Subscribe to tweets

Forensic Focus Forum Round-Up

Tuesday, April 15, 2014 (16:29:24)
Welcome to this round-up of recent posts to the Forensic Focus forums.

Forensic acquisition of a secure boot enabled Fujitsu laptop – what is the best method?

Forum members discuss why a Windows 7 MBR system may be unable to view a Windows 8 hard drive.

Car camera forensics – where do car cameras store data, and how can it be accessed? Add your thoughts on the forum.

Forum members explain how to recover internet history from an XBOX Live hard drive using IEF.

How does Microsoft Excel encrypt passwords? Chime in on the forum.

Should we take deleted data as a sign of guilt?

Forum members discuss whether it is possible to link an SD card to a specific phone.

Forum member jhall236 asks some questions about working in forensics for his Digital Forensics AS.

Add your suggestions to the list of books that every forensics investigator should read.

HMIC report highlights concern over cybercrime plans

Thursday, April 10, 2014 (12:29:55)
Three out of 43 police forces in England and Wales have a comprehensive plan to deal with a large-scale cyber-attack, a report has found.

Her Majesty's Inspectorate of Constabulary (HMIC) warned only Derbyshire, Lincolnshire and West Midlands had sufficient plans in place.

It also found only 2% of police staff across 37 forces had been trained on investigating cybercrime...

Read More (BBC)
  • Posted by: jamie
  • Topic: News
  • Score: 0 / 5
  • (934 reads)

CSI IT: Forensic security skills for IT professionals

Wednesday, April 09, 2014 (13:34:03)
TV shows such as CSI have popularised the world of digital forensics, glamorising the field and piquing the interest of a generation of graduates and career-movers, writes Kevin Waugh.

Because of this, it would be natural to assume that most businesses could now call on an extensive pool of talented experts in the forensics field capable of investigating technical security issues, such as the source of internal intellectual property (IP) leaks, or the theft of sales books by ex-employees moving to rival companies.

The reality is somewhat different...

Read More (ComputerWeekly.com)
  • Posted by: jamie
  • Topic: News
  • Score: 0 / 5
  • (1234 reads)

Tableau™ USB 3.0 Products Meet Forensic Users Need for High-Performance and Ease

Tuesday, April 01, 2014 (15:37:44)
Today’s Tableau catalog offers USB 3.0 support across a variety of forensic products: from write blockers to forensic duplicators. Our experience and our forensic customers tell us that when given the choice, they will always choose the fastest computer connection or system interface available to them. We’ve focused on USB 3.0 because of its speed and prevalence in today’s computer systems. The USB 3.1 specification (released in 2013) doubles the current theoretical rate for USB 3.0, ensuring a long lifecycle for USB 3 technology.

Cyber-bullies could face two years in jail under new internet troll rules

Wednesday, March 26, 2014 (14:04:35)
People convicted of cyber-bullying and text message abuse could face up to two years in prison, under plans backed by the UK government.

The justice secretary, Chris Grayling, has backed an amendment to the criminal justice bill that would target new rules at combating trolls that sexually harass and verbally abuse people on the internet or via mobile phones in England and Wales.

The amendment, due to be discussed in parliament on Thursday, was proposed by the Conservative MP for Ealing Central and Acton Angie Bray, after one of her constituents said her 14-year-old daughter had been “verbally raped” by 2,000 obscene texts sent by an older man, who escaped conviction...

Read More (The Guardian)
  • Posted by: jamie
  • Topic: News
  • Score: 0 / 5
  • (1482 reads)