±Partners and Sponsors

±Your Account


Forgotten password/username?

New Today: 2
New Yesterday: 8
Overall: 26810
Visitors: 65

±Follow Forensic Focus

Join our LinkedIn group

Subscribe to news

Subscribe to forums

Subscribe to blog

Subscribe to tweets

Page 3

Tableau TD3 Forensic Imaging System: Raising the Bar Since 2012

Tuesday, July 08, 2014 (14:37:43)
When Guidance Software originally released the Tableau TD3 forensic imaging system back in 2012, it was revolutionary. Forensic investigators had asked for and eagerly awaited innovations like the color touchscreen user interface, modular architecture, network imaging, and remote triage capabilities. The TD3 also supported write-blocked imaging of SATA, IDE, SAS, FireWire, USB 3.0, and iSCSI (network) storage devices. In 2013, Forensic 4Cast voters named it the Forensic Hardware Tool of the Year. Since its launch, the TD3 development team has relentlessly focused on adding new features, capabilities and options that help investigators get more work done faster, with more options. So if the last time you looked at TD3 was back in 2012, it may be time to take another look.

Finding and Analyzing Email with Internet Evidence Finder (IEF)

Tuesday, July 08, 2014 (08:57:25)
Internet Evidence Finder (IEF) is well known for its ability to excel at recovering Internet artifacts from chat, social networking and browsers including webmail. New with IEF v6.4, Magnet Forensics has expanded those capabilities to include desktop email as well. Microsoft Outlook is the most popular email client used in the enterprise today, and IEF is now able to parse PST and OST files for email evidence. IEF has also added support for the MBOX mail format commonly used by other email clients such as Mozilla Thunderbird. Finally, support for the enterprise instant messaging program Microsoft Lync, formerly known as Office Communicator, has also been included...

Read More (Magnet Forensics)

Can digital forensics keep up with smartphone tech?

Monday, July 07, 2014 (14:00:03)
The explosive growth in both the use and capacity of smartphones has led to a sea change in digital forensics, creating technology challenges for the justice and law enforcement communities and raising legal questions that in some cases have gone to the Supreme Court.

“When I started doing forensics, mobile devices meant flip-phones and texting,” said Josh Moulin, a contractor doing forensics work for a federal agency. The information you could expect to get from a phone was a contact list, some text messages and calendar entries.

“Today they are computers, and we are getting everything off of them that we would expect from a computer. You have a great picture of what a person is doing and is interested in...”

Read More (GCN)

Oxygen Forensic Suite 2014: Turbo-Charging Digital Investigations

Thursday, July 03, 2014 (11:14:02)
Oxygen Forensics has updated its flagship mobile evidence discovery solution, Oxygen Forensic Suite 2014, with more powerful visualizations, giving mobile forensic experts the widest range of updated analytic tools.

The updated release offers extra visualization options. The updated map view now offers the ability to create routes based on marked geolocation points, and allows overlaying several routes for instant analysis. The social view is also updated, adding state-of-the-art visualization of group communications from many popular mobile applications.
  • Posted by: jamie
  • Topic: News
  • Score: 0 / 5
  • (2055 reads)

Coming apart at the SIEMs...

Wednesday, July 02, 2014 (14:15:14)
Security Information and Event Management (SIEM) systems are all the rage at the moment – and with good cause.

As you are all aware, one item of data does not a case make, it is the combination & correlation between _all_ of the data that creates “evidence” – and here in the SIEM we are seeing the very thinnest separation between forensics and security – if we look at it today it is security, if we look at it tomorrow, it’s forensics.

An SIEM (oft pronounced “seem” – although mostly I like to spell out my TLAs ESS-AYE-EEE-EMM [ with a few notable exceptions ... raid, scuzzy, wizzywig ... but I suspect that shows my age more than anything else ! ] ) is a centralised system that collects information from other systems in the network. This information is typically – but not exclusively – collected from some, or all, of the normal logging of the system...

Read More