±Forensic Focus Partners

Become an advertising partner

±Your Account


Username
Password

Forgotten password/username?

Site Members:

New Today: 0 Overall: 29867
New Yesterday: 3 Visitors: 114

±Follow Forensic Focus

Forensic Focus Facebook PageForensic Focus on TwitterForensic Focus LinkedIn GroupForensic Focus YouTube Channel

Subscribe to news

Subscribe to forums

Page 2

Review - EnCase v7.10

Tuesday, December 29, 2015 (16:28:19)
After receiving a call to provide an evaluation on EnCase Forensic v7 Software, I started thinking of my case work on computer and mobile forensic analysis and the all tools that I have used over the years. The most commonly used by examiners like myself is one of the industry standards, EnCase. Guidance Software Inc. first presented this software in 1997. Guidance launched the current version (V7) in 2012, which brought a lot of changes to the software’s interface as well as many other well-known features in the software.

The current version of EnCase is V7.10; this tenth release reinforces the manufacturer’s great technical support. My first meeting with it was at Guidance’s training center in Slough, UK in 2012. My interaction with it has continued during many other training sessions of mine. EnCase is usually my primary forensic tool but also serves as an excellent verification tool.

Read More
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (4335 reads)

Organised Gangs Using Technology To Evade Police

Tuesday, December 29, 2015 (12:18:48)
Organised criminals are using apps and encrypted messaging to evade police, senior officers believe.

The issue has been described as the biggest challenge facing police focused on breaking up organised crime groups.

Police Scotland said they made more than 2,100 arrests in relation to organised crime last year. They estimate 220 gangs are currently dealing in drugs, firearms, high-value theft, fraud and human trafficking.

Some 122 people arrested in the last 12 months were described by officers as being principal players involved in serious and organised criminal activity.

Read More (BBC)
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (4505 reads)

Technology Saves Time In Investigations For The Boulder Police Department

Thursday, December 24, 2015 (15:42:04)
Within just six months, Cellebrite's UFED Link Analysis tool has saved the Boulder Police Department hundreds of hours in investigative time.

Review of HDDSurgery Samsung & Toshiba Ramp Set

Thursday, December 24, 2015 (14:35:02)
Reviewed by Mitch Impey

A few weeks ago I volunteered to do a review of the HddSurgery tools as I have been fascinated with the mechanics of hard drives since I started working with computers over 25 years ago.

I received a well wrapped package containing the ramp sets along with three test hard drives. Despite owning dozens of hard drives, none are defective, so HDD Surgery kindly sent me three drives to practice on.

Read More
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (4048 reads)

Interview with Dimitris Loulis from Northwind - HddSurgery

Thursday, December 24, 2015 (09:50:07)
We believe that the quality of products and satisfaction of our clients are the best marketing there is. When our colleagues from data recovery and computer forensics community recommend our tools, we know that we are on the right path and making the right moves.

In order to present what data recovery community thinks about HddSurgery products, we started publishing interviews with various data recovery experts.

First in line was Dimitris Loulis from Northwind Data Recovery.

New Nuix Study Finds Human Behaviour as the “Biggest Threat to Company Security”

Wednesday, December 23, 2015 (18:53:44)
Board-Level Concerns Force Increased Security Spending to Manage Insider Threats, Survey Finds

Global security intelligence and information management technology company Nuix has released the findings from a new survey of corporate information security practitioners that indicates a move toward a stronger focus on insider threats and more understanding of cybersecurity issues at the board level. The survey, titled Defending Data: Turning Cybersecurity Inside Out With Corporate Leadership Perspectives on Reshaping Our Information Protection Practices, was conducted by Ari Kaplan Advisors and sponsored by Nuix. It involved in-depth interviews of 28 corporate security officials and two experts with experience across thousands of security breach investigations. Download the Defending Data 2015 Report here.

Elcomsoft Cloud eXplorer: Forensic Acquisition of Google Accounts

Wednesday, December 23, 2015 (16:39:29)
ElcomSoft Co. Ltd. announces the release of Elcomsoft Cloud eXplorer, a digital forensic tool for acquiring data from Google accounts. Implementing over-the-air acquisition of information collected by the search giant, Elcomsoft Cloud eXplorer provides access to users’ search history, contacts, comprehensive Chrome browsing history, saved logins and passwords, notes, messages, and much more.

“It’s not about Android”, says Vladimir Katalov, ElcomSoft CEO. “Google collects and maintains massive amounts of information from registered customers using the many Google services from PCs and mobile devices. Normally, the information is scattered around the many services offered under the single sign-on roof of Google Account. Out tool pulls the data from all available sources, assembling available information in a single place. Just looking at the amount of data that is available is extremely impressive.”
  • Posted by: OlgaKok
  • Topic: News
  • Score: 0 / 5
  • (3501 reads)

Forensic Focus Forum Round-Up

Wednesday, December 23, 2015 (14:43:41)
Welcome to this round-up of recent posts to the Forensic Focus forums.

Is it possible to physically image a device over wifi?

Forum members discuss resetting Toshiba BIOS passwords.

Which Linux tools would you recommend to speed up file carving?

How would you recover data from a lost partition on a Dell Latitude E6? Add your thoughts in the forum.

How do you deal with SSD acquisition? Chime in on the forum.

How would you determine whether a text message was opened at a specific time?

Which books would you suggest someone should read to introduce them to the field of mobile forensics?

Forum members discuss how to recover a forgotten iPhone 6 backup password.
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (2616 reads)

The Next Stage in Digital Forensic Management

Wednesday, December 23, 2015 (12:54:30)
IntaForensics are leaders in digital forensic case and laboratory management solutions, having commercially released their flagship Lima product in 2009.

Occasionally, a change comes that truly changes the way that organizations approach the management not only of their cases, but their Forensic Practices as a whole. IntaForensics are excited to announce the next step in their Digital Forensic Case Management journey – Lima Insight – a true management reporting platform built for Digital Forensic Organizations.

Complimentary FTK 6.0 Product Webinar

Wednesday, December 23, 2015 (11:04:01)
A recording of the webinar "Complimentary FTK 6.0 Product Webinar" is now online and available to view here.

Join the forum discussion here.
View the webinar on YouTube here.
Read a full transcript of the webinar here.
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (1620 reads)