±Forensic Focus Partners

±Your Account


Forgotten password/username?

New Today: 1
New Yesterday: 3
Overall: 28198
Visitors: 62

±Forensic Focus Partner Links

Join our LinkedIn group

Subscribe to news

Subscribe to forums

Page 3

Belkasoft Adds Forensic Support for Windows Phone 8.1

Thursday, February 19, 2015 (12:08:29)
Belkasoft updates its digital forensic solution, Belkasoft Evidence Center 2015, with the ability to perform forensic analysis of Windows Phone 8.1 images acquired via JTAG flashers and Cellebrite UFED hardware.

The new release enables automated extraction, discovery and analysis of user data available in chip-off dumps acquired from mobile devices running Windows Phone 8 and 8.1. Supported data includes Web browsing histories, contacts, call logs, chats, instant message conversations, cached social network communications, screenshots of background applications, and many other types of data.

IEF Artifact Updates Have Become a More Frequent Thing

Wednesday, February 18, 2015 (14:52:08)
To stay on top of the rapidly evolving app landscape (and ensure IEF users continue to find as much digital evidence as possible in their investigations), the Magnet Forensics team has started to release more frequent artifact updates, adding to the list of hundreds of artifacts that IEF supports on computers, smartphones and tablets.

New this month, we have released support for a number of native iOS applications including Owner Information, Saved Wi-Fi Profiles, Saved Bluetooth Devices, Spotlight Searches, Word Dictionary, Installed Applications, Calendar Events, Deleted Notes, and Contacts. This new update is available now to customers who have added the mobile artifacts module to their license...

Read More (Magnet Forensics)

AccessData MPE+ 5.5.6 has been released

Wednesday, February 18, 2015 (10:56:49)
MPE+ 5.5.6 has been released featuring a new simpler installation process as well as new analysis and reporting capabilities. Some of the new features include:

You can now select files in both the media and the carved view to export the file to a desired location in the files’ native form. This allows you to:
Report on carved files using the attach file function in reports
Save native files to an evidence folder for later analysis
View files that are not currently viewable in the natural view

You can now report the information from the conversation view. While in the SMS view, you may select a message, right-click, and select a conversation view or select the conversation in the conversation pane. You can elect to remove the report by following the same procedure.

Download Release Notes
Download ISO

Forensic Focus Forum Round-Up

Monday, February 16, 2015 (19:01:46)
Welcome to this round-up of recent posts to the Forensic Focus forums.

Is there an MFT equivalent for EXT or HFS filesystems?

Forum members discuss how to get started with Snapchat forensics.

Which is the best programming language to learn for computer forensics? Add your thoughts in the forum.

Forum members discuss how to examine the shellcode of malicious Office documents.

Do you have any recommendations for good books about mobile forensics? Let us know on the forum.

How should storage be set up when creating a small digital forensics lab?

Forum members discuss recovering 12GB of missing photos from a 32GB microSD card.

Do you talk about your work with friends and family? Add your view on the forum.
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (1937 reads)

Forensic Analysis of SQLite Databases

Monday, February 16, 2015 (15:02:32)
SQLite is a widely popular database format that is used extensively pretty much everywhere. Both iOS and Android employ SQLite as a storage format of choice, with built-in and third-party applications relying on SQLite to keep their data. A wide range of desktop and mobile Web browsers (Chrome, Firefox) and instant messaging applications use SQLite, which includes newer versions of Skype (the older versions don’t work anyway without a forced upgrade), WhatsApp, iMessages, and many other messengers.

Forensic analysis of SQLite databases is often concluded by simply opening a database file in one or another database viewer. One common drawback of using a free or commercially available database viewer for examining SQLite databases is the inherent inability of such viewers to access and display recently deleted (erased) as well as recently added (but not yet committed) records...

Read More
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (1156 reads)

Job Vacancy: Snr. Computer Forensic Analyst, Oxfordshire, UK

Monday, February 16, 2015 (10:59:43)
This is an exciting opportunity for a Senior Computer Forensic Analyst / Digital Forensic Analyst to join our fantastic new Digital Forensics Team. The successful candidate will report to the Digital Forensics Manager, and will be responsible for managing and delivering their individually assigned cases for forensic analysis of computer equipment and mobile devices.

* Carry out digital forensic examinations of electronic mobile devices.
* Work methodically using the processes and documentation.
* Follow the strict quality procedures but be willing to propose ideas for continuous improvement.
* Share knowledge and assist with in-house training for the benefit of the team and the business.
* Secure and preserve digital evidence within the laboratory and within clients’ premises.
* Use various tools and techniques to analyse and investigate evidence.
* Provide rapid, clear, verbal and written reports, often for use in the Criminal Justice System.

Read More
  • Posted by: jamie
  • Topic: News
  • Score: 0 / 5
  • (948 reads)

Computer Forensics Critical in the Trial of Silk Road’s Ross Ulbricht

Friday, February 13, 2015 (12:21:22)
The ongoing trial of Silk Road creator Ross Ulbricht (a.k.a. Dread Pirate Roberts, or DPR) is not only fascinating, but it will have tremendous implications for criminals in the future. With close to a million registered users on the Silk Road and approximately $1.3 billion in transactions, the government had no choice but to prosecute the creator and alleged chief executive – Ross Ulbricht.

The Tor network Ulbricht used for years has been notorious for shielding the identities of some of the world’s most unsavory characters – trading in child abuse images, dealing narcotics, proffering stolen credit card numbers, pedaling guns and ammunition and many other illicit activities. If the government proves their case and successfully convicts Ulbricht, it will send shockwaves through the Dark Net community of criminal actors...

Read More (HSToday.us)
  • Posted by: jamie
  • Topic: News
  • Score: 0 / 5
  • (1366 reads)

"Test Drive" AccessData Products for FREE!

Wednesday, February 11, 2015 (18:11:57)
Available now:

Evaluate any available AccessData solution for 20 days, full product capabilities, no license, no dongle and no credit card required.

Click here to start your test drive today!

UK Home Office Report: eDiscovery in Digital Forensic Investigations

Wednesday, February 11, 2015 (13:52:25)
Nuix, a technology company that enables people to make fact-based decisions from unstructured data, welcomes the findings of the report ‘eDiscovery in Digital Forensic Investigations’ published by the United Kingdom Home Office. The report concludes that “Giving investigators rapid access to the digital information in a form that they can understand and work with has the potential to significantly enhance an investigation.”

The report details the results of a review of the use of eDiscovery software and workflows in the context of digital forensic investigation, conducted by the London Metropolitan Police Service and the UK Centre for Applied Science and Technology.

New CCFP Snapshot Describes What it Takes to Be a Certified Cyber Forensics Pro

Monday, February 09, 2015 (13:43:08)
The CCFP Snapshot offers an inside look at what it’s like to be a Certified Cyber Forensics Professional (CCFP). Offered by (ISC)2®, the global leader in information security certifications, CCFP is the only global cyber forensics credential that provides a comprehensive validation of a candidate’s knowledge and skills as a digital forensics expert.

Today’s digital forensics professionals need to understand far more than just hard drive and intrusion analysis. Whether a law enforcement officer supporting criminal investigations, a digital forensics specialist consulting clients, or an eDiscovery specialist working on litigation, CCFP demonstrates a professional’s ability to gather, analyze, and deliver digital evidence that is accurate, complete, and reliable.
  • Posted by: (ISC)2
  • Topic: News
  • Score: 0 / 5
  • (2455 reads)