±Forensic Focus Partners

Become an advertising partner

±Your Account


Forgotten password/username?

New Today: 6
New Yesterday: 10
Overall: 28817
Visitors: 78

±Follow Forensic Focus

Join our LinkedIn group

Subscribe to news

Subscribe to forums

Page 3

Webinar: Analyzing Evidence From Mobile Devices, Including Hidden/Deleted Data

Friday, June 26, 2015 (09:18:50)
A recording of the webinar "Analyzing Evidence From Mobile Devices, Including Hidden and Deleted Data" is now online and available to view here.

Join the forum discussion here.
View the webinar on YouTube here.
Read a full transcript here.
  • Posted by: jamie
  • Topic: News
  • Score: 0 / 5
  • (3554 reads)

Major Cybercrime Ring Dismantled By Joint Investigation Team

Thursday, June 25, 2015 (14:13:24)
A joint investigation team consisting of investigators and judicial authorities from six different European countries, supported by Europol and Eurojust, has taken down a major cybercriminal group during a coordinated action in Ukraine. With on-the-spot support from Europol, Austrian and Belgian law enforcement and judicial authorities, the action in Ukraine on 18 and 19 June resulted in the arrest of five suspects, eight house searches in four different cities, and the seizure of computer equipment and other devices for further forensic examination.

The aim of this JIT was to target high-level cybercriminals and their accomplices who are suspected of developing, exploiting and distributing Zeus and SpyEye malware - two well-known banking Trojans - as well as channelling and cashing-out the proceeds of their crimes.

Read More (Europol)
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (4114 reads)

Computer Ransom Hacker Jailed In New York

Thursday, June 25, 2015 (09:59:33)
A Swedish man who created malware which infected half a million computers around the world has been jailed in New York.

Alex Yucel, 25, owned the Blackshade organisation which sold sophisticated software to thousands of hackers in more than 100 countries. The program allowed hackers to access private photographs, passwords, and spy on victims through webcams. Data could also be locked, with victims then sent "ransom notes" to extort money.

In some cases, hackers obtained access to webcams to spy inside private homes, and victims could also be harassed using messages which computers would read aloud.

Read More (Sky News)
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (3748 reads)

Inside Scotland Yard's Communications Intelligence Unit

Thursday, June 25, 2015 (08:08:18)
At a police building in south London, which I've been asked not to identify, I'm led through security gates, into the lift, up several floors and along a corridor to Scotland Yard's Communications Intelligence Unit.

A sign on the door says No Unauthorised Access, but police have invited me in because they want to set the record straight. What they do here is not about snooping on our calls and emails, they say - it's about saving lives. A whiteboard lists the priority cases, known as Grade Ones, where there is an immediate threat to someone's life...

Read More (BBC News)

Job Vacancy: MediaClone Seeking a Sales Rep - Los Angeles, CA

Wednesday, June 24, 2015 (13:31:48)
MediaClone is seeking a Sales Rep. to sell the MediaClone Forensic line of products to a wide variety of potentials customers, including many US government branches, and local, state, and federal law enforcement agencies, as well as e-Discovery and legal support services, Corporate Cyber Security departments. The company is also looking to develop online sales channels for the IT markets and pursue sales relationships with many IT resellers.

The ideal candidate is a professional, with a confident and pleasant phone presence, with experience conducting on-line presentations and product demonstrations. The candidate should also have extensive knowledge of and at least 5 years’ experience selling products in computer forensic markets.

Read More
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (2742 reads)

Webinar: Computer Forensics and the Cloud - Rising Above The Storm

Tuesday, June 23, 2015 (15:09:06)
Date: Tuesday June 30, 2015
Time: 10:00am CST / 4:00pm BST / 3:00pm GMT

Cloud Forensics brings unique concerns regarding acquisition, preservation, and analysis of potential digital evidence. Examiners will find less allocated evidence left behind on a system when a subject is using the cloud. Information stored in the cloud, can be stored anywhere in the world, and based on its location or country, privacy laws could be an issue. Establishing a chain of custody is difficult or almost impossible and its integrity and authenticity cannot be fully determined. Criminals are using free and paid, convenient storage options, like Google Drive and Dropbox, to store illegal photos, files, and to launch malware attacks. Additionally, these cloud sites can be used to share malware infected files that can compromise systems. The installed malware is used to siphon data from computers out and onto Google, Dropbox, OneDrive, etc.

In this webinar, attendees will learn what to expect when examining a local computer that has been used to store information in the cloud. Learn the best ways to access artifacts that may relate to cloud usage and can be key evidence to your investigation.

Register now at http://bit.ly/1IP2pDu
  • Posted by: jamie
  • Topic: News
  • Score: 0 / 5
  • (2223 reads)

The Future of Mobile Forensics

Tuesday, June 23, 2015 (12:23:23)
Most would agree that the golden age of mobile forensics is over. There is no longer an easy way to get through the passcode in new iOS devices running the latest version of iOS. Chip-off acquisition is dead for iOS devices due to full-disk encryption, while physical acquisition of Apple hardware is dead since the introduction of 64-bit devices and versions of iOS 8 that cannot be jailbroken.

Blackberries were highly resistant to chip-off acquisition from the beginning, and Android is getting there quickly. In this whitepaper, we will look into the current state of mobile forensics for the different platforms and devices, analyze current trends and attempt to predict how mobile forensics will look in the years ahead.

To gather these predictions, Belkasoft analyzed state-of-the-art tools, methods and hardware offered by leading manufacturers, and interviewed experts working for manufacturers of digital forensic products.

Read More
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (2130 reads)

TSFIC 2015 – Recap

Monday, June 22, 2015 (17:14:40)
This article is a recap of some of the main highlights from the Techno Security and Forensics Investigations Conference (TSFIC) held in Myrtle Beach, South Carolina, from the 31st of May until the 3rd of June 2015.

The conference began at midday on Sunday 31st of May, with six main strands running throughout the duration of the event. Attendees received a colour-coded programme which allowed them to easily see which of the talks were part of the Audit, Forensics, Information Security, Investigations, Cellebrite Lab or Nuix Lab parts respectively.

The Information Security session by Chris Pogue was one of the talks that introduced the conference. Pogue discussed the recent spike in reported data breaches around the world, and questioned whether more data breaches had actually been happening in recent years, or whether the media were just reporting on them more frequently.

Read More
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (1329 reads)

Digital Forensics Poses Challenges for Texas Law Enforcement

Monday, June 22, 2015 (10:04:42)
At the South Austin, Texas, home of George De La Cruz, a one-story house with baby blue trim and a concrete porch lined with potted plants, investigators found no body. No physical proof Julie Ann Gonzalez was killed.

Prosecutors took him to trial anyway, and, in April, persuaded jurors De La Cruz had slain his estranged wife and used her cellphone to fool everyone into thinking she ran away. His conviction was hailed as a huge victory for authorities, who had no eyewitnesses, no confessions, no DNA tests, none of the evidence typical in most murders.

Read More (GovTech Magazine)
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (2080 reads)

New features in ReclaiMe Pro

Sunday, June 21, 2015 (18:27:18)
ReclaiMe Data Recovery Company announced that they added some forensic features to their ReclaiMe Pro software.

The new features, added to better serve digital investigators' needs, include

• file traces,
• calculating file hashes and searching by hashes,
• file content classifier.

The first feature, file traces, shows where a file data is physically located on a disk. Additionally, ReclaiMe Pro provides the source on-disk location for timestamps (creation, modification, and last access) for a file.

Search by file hashes allows sorting files against a ready-made or custom hash database.

Using file content classifier one can determine that a file content mismatches its extension.

All these features are available in evaluation version of ReclaiMe Pro.

For more information, please visit www.ReclaiMe-Pro.com.