±Forensic Focus Partners

Become an advertising partner

±Your Account


Nickname
Password


Forgotten password/username?


Membership:
New Today: 2
New Yesterday: 3
Overall: 28708
Visitors: 65

±Follow Forensic Focus

Join our LinkedIn group

Subscribe to news

Subscribe to forums

Page 3

White House Weighs Sanctions After Second Breach of a Computer System

Monday, June 15, 2015 (10:04:10)
The White House on Friday revealed that hackers had breached a second computer system at the Office of Personnel Management, and said that President Obama was considering financial sanctions against the attackers who gained access to the files of millions of federal workers.

Investigators had already said that Chinese hackers appeared to have obtained personal data from more than four million current and former federal employees in one of the boldest invasions into a government network.

Read More (New York Times)
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (1839 reads)

Webinar: UFED Cloud Analyzer - Unlock actionable intelligence from cloud data

Monday, June 15, 2015 (08:03:41)
Date: Tuesday June 16, 2015

Registration: http://go.cellebrite.com/cloud_web_jun2015_reg

Presenter: Shahaf Rozanski, Senior Forensics Product Manager, Cellebrite

With 58% of people using their mobile device to access social media, a wealth of personal information is uploaded onto these social networks that provides a goldmine of potential evidence. In this webinar, learn how to:

- Perform timely extraction of private user data from key social media, webmail and cloud storage sources: Facebook, Twitter, Gmail, Google Drive, Dropbox, Kik, etc.
- Dynamically visualize and analyze large data sets in a unified format to bring key insights to the surface quickly
- Share relevant evidence or intelligence via easy-to-read, custom reports or export data to other analytical tools for deeper investigation

The webinar ends with a Q&A session. Register now at http://go.cellebrite.com/cloud_web_jun2015_reg
  • Posted by: jamie
  • Topic: News
  • Score: 0 / 5
  • (1339 reads)

Researchers Extract Personal Data From Smartwatches

Friday, June 12, 2015 (08:20:30)
Researchers at the University of New Haven have shown that they can extract personal information from the LG G Watch and from the Samsung Gear 2 Neo. Specifically, they retrieved calendar, contacts and pedometer data from the G Watch, along with the watch user's email address. On the Gear 2 Neo, they got health, email, messages and contacts data. None of it was encrypted.

"It was not very difficult to get the data, but expertise and research was required," said Ibrahim Baggili, director of the university's Cyber Forensics Research and Education Group (UNHCFREG).

Read More (Cnet)
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (2317 reads)

US Brings Case Against Alleged Cyber-Espionage Perpetrators

Wednesday, June 10, 2015 (14:06:04)
On a wall facing dozens of cubicles at the FBI office in Pittsburgh, five guys from Shanghai stare from “Wanted” posters. Wang Dong, Sun Kailiang, Wen Xinyu, Huang Zhenyu, and Gu Chunhui are, according to a federal indictment unsealed last year, agents of China’s People’s Liberation Army Unit 61398, who hacked into networks at American companies—U.S. Steel, Alcoa, Allegheny Technologies (ATI), Westinghouse—plus the biggest industrial labor union in North America, United Steelworkers, and the U.S. subsidiary of SolarWorld, a German solar-panel maker.

Over several years, prosecutors say, the agents stole thousands of e-mails about business strategy, documents about unfair-trade cases some of the U.S. companies had filed against China, and even piping designs for nuclear power plants—all allegedly to benefit Chinese companies.

Read More (MIT Technology Review)
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (1775 reads)

International Operation Dismantles Criminal Group of Cyber-Fraudsters

Wednesday, June 10, 2015 (11:51:10)
Yesterday, a joint international operation led to the dismantling of a group of cybercriminals active in Italy, Spain, Poland, the United Kingdom, Belgium and Georgia, who are suspected of committing financial fraud involving email account intrusions.

The operation resulted in the arrest of 49 suspected members of the criminal group, 58 properties were searched, and authorities seized laptops, hard disks, telephones, tablets, credit cards and cash, SIM cards, memory sticks, forged documents and bank account documents.

Read More (Europol)
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (2077 reads)

Start With the Exam Outline for CCFP Digital Forensics Certification

Wednesday, June 10, 2015 (09:48:04)
The Certified Cyber Forensics Professional (CCFP) certification is the only global cyber forensics credential that provides a comprehensive validation of your knowledge and skills as a digital forensics expert. Developed by (ISC) 2 , a leader in the information security certification market, CCFP is for those who have been working in the field and would like to take the next step and apply their cyber forensics expertise to a variety of challenges.

In order to get started and become CCFP certified, download the CCFP Exam Outline to learn what you need to know to sit for the exam.

  • Posted by: (ISC)2
  • Topic: News
  • Score: 0 / 5
  • (2266 reads)

Feds Want to ID Web Trolls Who ‘Threatened’ Silk Road Judge

Tuesday, June 09, 2015 (10:47:06)
On Dark Web sites like the Silk Road black market and its discussion forums, anonymous visitors could write even the most extreme libertarian and anarchist statements without fear. The rest of the internet, as a few critics of the US judicial system may soon learn, isn’t quite so free of consequences.

Last week the Department of Justice issued a grand jury subpoena to the libertarian media site Reason.com, demanding that it identify six visitors to the site. The subpoena letter, obtained and published by blogger Ken White, lists trollish comments made by those six Reason readers that—whether seriously or in jest—call for violence against Katherine Forrest, the New York judge who presided over the Silk Road trial and late last month sentenced Silk Road creator Ross Ulbricht to life in prison...

Read More (Wired)
  • Posted by: jamie
  • Topic: News
  • Score: 0 / 5
  • (2151 reads)

Interview with Adam Hovak, Software Product Manager, Exelis

Tuesday, June 02, 2015 (18:40:58)
Adam, you’re a Software Product Manager at Exelis. Could you tell us a bit about what the company does, and what your own role involves?

We’ve had some pretty big changes at Exelis in the last few weeks; As of May 29th 2015, Exelis was officially acquired by Harris Corporation. The combined Harris/Exelis acquisition (called Harris) is a pretty large defense company, that seems to do everything from night vision goggles to the next generation FAA control system for commercial flights, to communication radios. Our office in Rome, NY focuses primarily on information assurance and information protection. We started out years ago by building transfer devices for the Department of Defense (DoD) that would allow the automated transfer of data between networks of differing classification levels. In order to do our job effectively, we’ve had to understand all types of data.

Read More
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (2548 reads)

Cellebrite Offers Advanced Services to Enhance Agency Mobile Forensics

Tuesday, June 02, 2015 (16:20:16)
Today at Mobile Forensic World, Cellebrite introduced a new line of Advanced Investigative Services that enable law enforcement agencies globally to enhance existing mobile forensics expertise whenever and wherever it’s needed. Cellebrite’s Advanced Investigative Services (CAIS) is designed to complement and expand existing digital forensics skillsets and tools to expedite and protect evidence from mobile devices in the toughest investigations.

Passware Kit 2015v.3 Acquires Files From OneDrive & Extracts Windows Phone Data

Monday, June 01, 2015 (21:20:41)
NEW IN PASSWARE KIT 2015 v.3

* Acquisition of files from Microsoft OneDrive
* Data extraction from Windows Phones
* Hardware acceleration with TACC2