±Forensic Focus Partners

Become an advertising partner

±Your Account


Forgotten password/username?

New Today: 2
New Yesterday: 3
Overall: 28708
Visitors: 79

±Follow Forensic Focus

Join our LinkedIn group

Subscribe to news

Subscribe to forums

Page 2

TSFIC 2015 – Recap

Monday, June 22, 2015 (17:14:40)
This article is a recap of some of the main highlights from the Techno Security and Forensics Investigations Conference (TSFIC) held in Myrtle Beach, South Carolina, from the 31st of May until the 3rd of June 2015.

The conference began at midday on Sunday 31st of May, with six main strands running throughout the duration of the event. Attendees received a colour-coded programme which allowed them to easily see which of the talks were part of the Audit, Forensics, Information Security, Investigations, Cellebrite Lab or Nuix Lab parts respectively.

The Information Security session by Chris Pogue was one of the talks that introduced the conference. Pogue discussed the recent spike in reported data breaches around the world, and questioned whether more data breaches had actually been happening in recent years, or whether the media were just reporting on them more frequently.

Read More
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (1297 reads)

Digital Forensics Poses Challenges for Texas Law Enforcement

Monday, June 22, 2015 (10:04:42)
At the South Austin, Texas, home of George De La Cruz, a one-story house with baby blue trim and a concrete porch lined with potted plants, investigators found no body. No physical proof Julie Ann Gonzalez was killed.

Prosecutors took him to trial anyway, and, in April, persuaded jurors De La Cruz had slain his estranged wife and used her cellphone to fool everyone into thinking she ran away. His conviction was hailed as a huge victory for authorities, who had no eyewitnesses, no confessions, no DNA tests, none of the evidence typical in most murders.

Read More (GovTech Magazine)
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (1892 reads)

New features in ReclaiMe Pro

Sunday, June 21, 2015 (18:27:18)
ReclaiMe Data Recovery Company announced that they added some forensic features to their ReclaiMe Pro software.

The new features, added to better serve digital investigators' needs, include

• file traces,
• calculating file hashes and searching by hashes,
• file content classifier.

The first feature, file traces, shows where a file data is physically located on a disk. Additionally, ReclaiMe Pro provides the source on-disk location for timestamps (creation, modification, and last access) for a file.

Search by file hashes allows sorting files against a ready-made or custom hash database.

Using file content classifier one can determine that a file content mismatches its extension.

All these features are available in evaluation version of ReclaiMe Pro.

For more information, please visit www.ReclaiMe-Pro.com.

SYN-CON Promises to be a Training Event Like No Other

Friday, June 19, 2015 (15:14:38)
Digital forensic examiners are confronted by many challenges today. More people are using the Cloud as a conduit for criminal activity and the countdown is on for the release of the Microsoft Windows 10 operating system. Examiners must be ready to adapt to these and many other changes in order to be successful at their jobs.

The new SYN-CON training conference will be held August 17-19, 2015 in Lake Mary, Florida. The conference centers on refreshing and renewing skills in sessions presented by industry leading instructors. All sessions are based on the latest research and techniques needed for examiners with breakthrough examination methods, as well as certification prep courses and exams.

This is a unique opportunity to experience the converging areas of cybersecurity, computer forensics, legal, and e-discovery all at one event.

Review - Learning iOS Forensics

Friday, June 19, 2015 (12:56:19)
Learning iOS Forensics is a practical textbook that aims to help digital forensics examiners of all levels to get to grips with the procedures involved in forensically analysing iOS devices.

The book opens with a preface, which describes how the various sections are set out and delineates the recommended audience. It explains that the book can either be read sequentially or used as a reference work in ongoing investigations. My own experience of reading the book would back this up – I read it from cover to cover and found it to be an excellent resource for iOS forensics, both as someone who has not yet come across an iOS device in an investigation, and as someone who is interested in digital forensics as a discipline.

Read More
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (1635 reads)

Learn About Digital Forensics in Law Enforcement – New White Paper from (ISC)2

Friday, June 19, 2015 (11:28:53)
Over the last decade, digital or cyber forensics has become a key part of criminal investigations, helping to solve or expedite cases that would have previously gone unsolved. The growing trail of digital evidence that investigators can tap is almost limitless, and the sources generating this data continue to evolve – from the Internet and mobile devices to vehicle sensors and wearable fashion. To support the processes and procedures required by law to successfully prosecute cases, digital forensics has grown into a scientific discipline and gained influence and credibility within the justice system.
  • Posted by: (ISC)2
  • Topic: News
  • Score: 0 / 5
  • (1809 reads)

US Secret Service Agent Shaun Bridges to Plead Guilty to Silk Road Bitcoin Theft

Friday, June 19, 2015 (09:18:30)
A US secret service agent who helped track down Silk Road mastermind Ross Ulbricht is to plead guilty to a string of fraud and money laundering charges.

Special agent Shaun Bridges worked as a computer forensics expert to help locate the website's servers, alongside undercover colleague Carl Mark Force, who communicated with Dread Pirate Roberts, the owner of Silk Road who was eventually revealed as Ulbricht.

But during the many months they spent posing as users of the site – and even a potential buyer of the entire business – Force and Bridges fell to temptation, with Bridges funneling $800,000 of bitcoins earned by Silk Road into his own bank accounts without authorisation.

Read More (IB Times)
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (1599 reads)

Building and Improving Magnet ACQUIRE

Thursday, June 18, 2015 (13:58:04)
A month ago, Magnet Forensics launched the Magnet ACQUIRE beta program and welcomed customers to download and try the new smartphone acquisition tool. The early feedback from the community has been positive. Many users have shared success stories detailing how the tool has helped them obtain an image from difficult–to-extract devices that have been failing with their other tool sets.

Read More (Magnet Forensics)

Forensic Focus Forum Round-Up

Tuesday, June 16, 2015 (10:29:05)
Welcome to this round-up of recent posts to the Forensic Focus forums.

What would you do in a case involving IIOC embedded within a game?

How would you load and analyse a partially-acquired image?

Forum members debate the usefulness of wiping a drive before putting evidence on it.

How would you access an image that has been encrypted using Bitlocker?

Forum members discuss how to image a Fusion drive in an iMac.

How would you get past the passcode of an iPhone 5 running iOS 8.0?

Do you have any suggestions for CDR analysis software?

Forum members give advice regarding a student’s final project idea.
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (1894 reads)

Dutch Develop Computer Forensics App For Botnet Investigations

Monday, June 15, 2015 (13:54:48)
The Netherlands Forensic Institute is working on a Linux-based forensic operating system that will enable the police to secure and remotely analyze evidence related to botnets, project leader Ruud Schramp told Security.NL.

Securing and analyzing digital evidence related to botnets is a costly and time-intensive operation for both the police and the data centers where the data is located. With this project, which received financial incentives from the National Coordinator for Counter Terrorism and Security, the NFI hopes to streamline this process.

Read More (NL Times)
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (2275 reads)