±Forensic Focus Partners

±Your Account


Nickname
Password


Forgotten password/username?


Membership:
New Today: 1
New Yesterday: 2
Overall: 27631
Visitors: 70

±Follow Forensic Focus

Join our LinkedIn group

Subscribe to news

Subscribe to forums

Subscribe to blog

Subscribe to tweets

Page 2

Analyzing Windows Phone Artifacts with IEF

Wednesday, December 10, 2014 (13:30:29)
New with Internet Evidence Finder (IEF) v6.5, Magnet Forensics has added support for a number of native and third-party apps for Windows Phone. Using JTAG and Chip-off techniques, forensics examiners can use IEF to recover call logs, SMS/MMS, emails, and contacts.

One of the major challenges for Windows Phone analysis is the acquisition phase. Unlike other devices, such as iOS and Android, JTAG and Chip-off acquisitions are the only methods to acquire most Windows Phones. This means that your traditional forensic acquisition tools such as Cellebrite, XRY, MPE+, etc., cannot acquire the data from a Windows Phone...

Read More (Magnet Forensics)

How NIST is helping law enforcement with digital forensics

Wednesday, December 10, 2014 (09:13:15)
“Digital forensics is at a time of crisis and a time of opportunity.”

This remark from Eoghan Casey, lead cybersecurity engineer at the MITRE Corp., highlighted the overarching themes presented at the first day of the National Institute of Standards and Technology forensics conference Wednesday.

Throughout the morning, a number of NIST scientists, engineers and program managers poured over the ways the agency is helping law enforcement enhance investigations tied to recovering data from digital devices or improving the accuracy of biometrics...

Read More (fedscoop)
  • Posted by: jamie
  • Topic: News
  • Score: 0 / 5
  • (1601 reads)

Oxygen Forensics releases the new and free Oxygen Forensic Viewer

Tuesday, December 09, 2014 (11:10:42)
Oxygen Forensics releases Oxygen Forensic Viewer, a stand-alone tool for viewing and sharing information collected with Oxygen Forensic Suite. Fast, easy and lightweight, Oxygen Forensic Viewer allows accessing the complete set of evidence, analyzing deleted data, examining suspects’ communications and locating all types of evidence with built-in search. While the tool is available to licensed users of Oxygen Forensic Suite, the Suite itself is not required for installing and using Oxygen Forensic Viewer.

Effectively, Oxygen Forensic Viewer is a perfect tool for sharing information with colleagues and coworkers, enabling easy access to evidence collected with Oxygen Forensic Suite without additional costs and learning curve.

Webinar: Investigating Sexual Crimes in the Tinder Age

Thursday, December 04, 2014 (12:19:14)
Date/Time: Tuesday December 16th, 2014 @ 10:00 am EST (3pm GMT)

The usage of location-based mobile dating applications like Tinder and Grindr has exploded over the last year. This new class of mobile app allows singles to identify, chat with, and meet other singles located in their immediate vicinity. As the popularity of these apps continues to grow, they will become increasingly important sources of evidence for digital forensics examiners.

On Tuesday December 16th, join Jad Saliba and Jamie McQuaid from Magnet Forensics as they explore what you need to know about finding and analyzing evidence from this new class of mobile dating application using a real-world case scenario...

REGISTER TODAY HERE
  • Posted by: jamie
  • Topic: News
  • Score: 0 / 5
  • (1769 reads)

IIF – an evidence extraction model for investigation

Wednesday, December 03, 2014 (14:35:49)
This framework was first introduced in DFRWS EU 2014 (the first DFRWS conference in Europe) at Amsterdam held in May and later presented at Hacks in Taiwan 2014 (HITCON) which is a high-tech security conference in Taiwan held in August.

Abstract

Digital forensics investigators are facing new challenges every day because there are a large variety of high-tech cybercrimes reported. For instance APT, Hacking, Ransomware and DDOS etc… During investigation, investigators are often too concentrated on the evidence itself, like reversing the malware for the detailed behaviors or analyzing packets for credential leakage, but seldom or having difficulties to draw out the whole picture of the incident by correlating the seized / acquired evidences for the intelligence purpose. All relevant data from seized media should be utilized and analyzed, later transformed to intelligence so as to build a profile of the potential suspect with the corresponding attributes...

Read More
  • Posted by: jamie
  • Topic: News
  • Score: 0 / 5
  • (1023 reads)