±Forensic Focus Partners

Become an advertising partner

±Your Account


Nickname
Password


Forgotten password/username?


Membership:
New Today: 1
New Yesterday: 8
Overall: 28497
Visitors: 174

±Follow Forensic Focus

Join our LinkedIn group

Subscribe to news

Subscribe to forums

Page 3

Digital Forensic Evidence Uncovers Entry Point For Background-Check System Hack

Monday, May 11, 2015 (14:37:58)
Hackers broke into third-party software in 2013 to open personal records on U.S. federal employees and contractors with access to classified intelligence, according to the government's largest private employee investigation provider.

That software apparently was an SAP enterprise resource planning application. It’s unclear if there was a fix available for the program flaw at the time of the attack. It’s also not clear whether SAP—which was responsible for maintaining the application—or USIS would have been responsible for patching the flaw...

Read More (NextGov)
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (2438 reads)

Forensics Europe Expo 2015 – Recap

Monday, May 11, 2015 (10:52:50)
This article is a recap of some of the main highlights of the Forensics Europe Expo (FEE) held in Kensington Olympia, London, on the 21st and 22nd of April 2015.

Expo Highlights

As an event that focuses on all aspects of forensics, as well as being twinned with the Counter Terror Expo, FEE provides an interesting holistic look at how a crime scene is processed and analysed. This year’s conference saw a lot of attention on fingerprint analysis, although digital forensics also played a strong role in the programme.

Brian Rankin’s discussion about the importance of innovation in forensic investigations, one of the first talks of the conference, looked at the Silverman review and its implications for innovation.

Read More
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (1749 reads)

Hex & Text Viewer Added to Magnet IEF

Saturday, May 09, 2015 (09:08:50)
Every forensic examiner is familiar with hex and text viewers; they are the cornerstone of the most basic forensic examination. If all your tools and scripts fail or don’t support a given artifact, you can always fall back to a hex viewer to dig into an artifact to uncover any evidence within. New with IEF version 6.6, we are happy to include a Hex and Text Viewer to assist investigators in their examination.

Read More (Magnet Forensics)

Discover More Than 100 Mobile Artifacts with Evidence Center v.7.2

Tuesday, May 05, 2015 (14:50:13)
Belkasoft extends support for mobile applications in the new v.7.2 of its Belkasoft Evidence Center. In addition to more than half a thousand artifacts found inside desktop and laptop computers, which the software was able to analyze before, the new version also finds and extracts 100+ types of mobile artifacts for modern mobile devices such as Android, iPhone/iPad, Blackberry and Windows Phone 8/8.1.

Interview with Liwei Ren, Scientific Advisor, Trend Micro

Tuesday, May 05, 2015 (10:21:45)
Liwei, you're Scientific Advisor at Trend Micro. Could you tell our readers a bit about your role, and what an average day looks like?

I have multiple responsibilities. Internally, I work with a few R&D teams as an adviser for developing novel security technologies powered by mathematical models and advanced algorithms, and I also help introduce cutting-edge technologies to the company through continuous follow-ups and technology evaluation in relevant fields. I visit other R&D centers in Taipei and Nanjing a few times a year for collaborative projects. During the visit, I always conduct a few seminars at Trend University (an internal education program) to share the most recent technologies since I am based in Silicon Valley. In addition, I own an interesting research project in the area of byte-wise approximate matching that aims at building a framework for byte-wise file matching, searching and clustering.

Read More
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (1847 reads)

Magnet Forensics Releases Magnet IEF v6.6

Monday, May 04, 2015 (11:52:16)
Magnet Forensics, the global leader in the development of digital forensics software that recovers evidence from computers, smartphones and tablets, announced today the release of Magnet IEF v6.6. This release adds a number of new and advanced analysis features to IEF that will aid examiners in locating and validating recovered data. These features include Hex Viewer, Text Viewer, Profile development capabilities, Partial Artifact filter, Histogram View, and Examiner/Investigator Modes.

Read More (Magnet Forensics)

Capturing RAM Dumps and Imaging eMMC Storage on Windows Tablets

Friday, May 01, 2015 (12:16:08)
While Windows desktops and laptops are relatively easy to acquire, the same cannot be said about portable Windows devices such as tablets and convertibles (devices with detachable keyboards). Having no FireWire ports and supplied with a limited set of external ports, these devices make attaching acquisition media more complicated in comparison to their full-size counterparts. Equipped with soldered, non-removable eMMC storage, Windows tablets are extremely difficult to image while following the required forensic routine. Finally, the obscure Windows RT does not allow running unsigned desktop applications at all while restricting the ability to boot into a different OS, making forensic acquisition iffy at best.

Read More
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (2968 reads)

BitLocker experience (forum discussion)

Thursday, April 30, 2015 (17:09:14)
Thought I'd share a recent experience. I'm an internal corporate resource in a team of one (i.e. me). We had to get images of a number of Win7 Enterprise machines, some from "close by" and some from another continent. Corporate Policy protects Laptops with BitLocker but not Desktops.

I did the "close by" ones (mix of Laptop and Desktop). Due to time constraints I used WinFE to boot all machines, then got the Bitlocker ID using manage-bde and finally called our internal service desk who supplied the Recovery Password which is stored in MBAM. Then I created Logical images in FTK Imager Lite which is part of my WinFE config by mounting the BitLocker drive in read-only mode...


Read More
  • Posted by: jamie
  • Topic: News
  • Score: 0 / 5
  • (2550 reads)

Interview with Mary Aiken, Cyberpsychologist, RSCI

Thursday, April 30, 2015 (09:54:24)
Mary, you're currently Professor and Director at the RCSI's CyberPsychology Research Centre. Tell us a bit about your role and what a typical day looks like.

I am a CyberPsychologist and Director of the RCSI CyberPsychology Research Centre, I am a Distinguished Professor of the Practice of Cyber Analytics of the Asia-Pacific Institute for Resilience and Sustainability (AIRS), which is jointly anchored at Swansea University’s Network Science Research Centre and Hawaii Pacific University.

The CyberPsychology Research Centre exists to provide analysis, insight and leadership in understanding the benefits, risks and applications of current and emerging human-technology interfaces. Our vision is that our research centre will become a global leader in producing research and supporting education and intervention at the intersection of psychology and technology.

Read More
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (1744 reads)

TDFCon 2015 – Middlesbrough 15th May

Wednesday, April 29, 2015 (13:17:10)
On May 15th 2015, Forensic Focus will be attending TDFCon – the Teesside Digital Forensics Conference – at Teesside University, Middlesbrough. If there are any topics you would like us to cover in-depth, or if there are any speakers you think we should interview, please let us know in the comments.

TDFCon has been running for eleven years, and this year’s conference is being sponsored by Avatu and the Chartered Society of Forensic Sciences. There will be a number of international speakers flying in for the conference, which will provide an in-depth look at current academic research in the field, as well as a wide range of industry presentations. There will also be opportunities to discuss research one-to-one with the speakers themselves, and a series of workshops where attendees can find out more about the subjects being presented.

Read More
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (1754 reads)