±Forensic Focus Partners

Become an advertising partner

±Your Account


Nickname
Password


Forgotten password/username?


Membership:
New Today: 0
New Yesterday: 0
Overall: 28388
Visitors: 92

±Follow Forensic Focus

Join our LinkedIn group

Subscribe to news

Subscribe to forums

Digital Forensics, Computer Forensics, eDiscovery

Discover More Than 100 Mobile Artifacts with Evidence Center v.7.2

Tuesday, May 05, 2015 (14:50:13)
Belkasoft extends support for mobile applications in the new v.7.2 of its Belkasoft Evidence Center. In addition to more than half a thousand artifacts found inside desktop and laptop computers, which the software was able to analyze before, the new version also finds and extracts 100+ types of mobile artifacts for modern mobile devices such as Android, iPhone/iPad, Blackberry and Windows Phone 8/8.1.

Interview with Liwei Ren, Scientific Advisor, Trend Micro

Tuesday, May 05, 2015 (10:21:45)
Liwei, you're Scientific Advisor at Trend Micro. Could you tell our readers a bit about your role, and what an average day looks like?

I have multiple responsibilities. Internally, I work with a few R&D teams as an adviser for developing novel security technologies powered by mathematical models and advanced algorithms, and I also help introduce cutting-edge technologies to the company through continuous follow-ups and technology evaluation in relevant fields. I visit other R&D centers in Taipei and Nanjing a few times a year for collaborative projects. During the visit, I always conduct a few seminars at Trend University (an internal education program) to share the most recent technologies since I am based in Silicon Valley. In addition, I own an interesting research project in the area of byte-wise approximate matching that aims at building a framework for byte-wise file matching, searching and clustering.

Read More
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (384 reads)

Magnet Forensics Releases Magnet IEF v6.6

Monday, May 04, 2015 (11:52:16)
Magnet Forensics, the global leader in the development of digital forensics software that recovers evidence from computers, smartphones and tablets, announced today the release of Magnet IEF v6.6. This release adds a number of new and advanced analysis features to IEF that will aid examiners in locating and validating recovered data. These features include Hex Viewer, Text Viewer, Profile development capabilities, Partial Artifact filter, Histogram View, and Examiner/Investigator Modes.

Read More (Magnet Forensics)

Capturing RAM Dumps and Imaging eMMC Storage on Windows Tablets

Friday, May 01, 2015 (12:16:08)
While Windows desktops and laptops are relatively easy to acquire, the same cannot be said about portable Windows devices such as tablets and convertibles (devices with detachable keyboards). Having no FireWire ports and supplied with a limited set of external ports, these devices make attaching acquisition media more complicated in comparison to their full-size counterparts. Equipped with soldered, non-removable eMMC storage, Windows tablets are extremely difficult to image while following the required forensic routine. Finally, the obscure Windows RT does not allow running unsigned desktop applications at all while restricting the ability to boot into a different OS, making forensic acquisition iffy at best.

Read More
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (1498 reads)

BitLocker experience (forum discussion)

Thursday, April 30, 2015 (17:09:14)
Thought I'd share a recent experience. I'm an internal corporate resource in a team of one (i.e. me). We had to get images of a number of Win7 Enterprise machines, some from "close by" and some from another continent. Corporate Policy protects Laptops with BitLocker but not Desktops.

I did the "close by" ones (mix of Laptop and Desktop). Due to time constraints I used WinFE to boot all machines, then got the Bitlocker ID using manage-bde and finally called our internal service desk who supplied the Recovery Password which is stored in MBAM. Then I created Logical images in FTK Imager Lite which is part of my WinFE config by mounting the BitLocker drive in read-only mode...


Read More
  • Posted by: jamie
  • Topic: News
  • Score: 0 / 5
  • (1383 reads)

Interview with Mary Aiken, Cyberpsychologist, RSCI

Thursday, April 30, 2015 (09:54:24)
Mary, you're currently Professor and Director at the RCSI's CyberPsychology Research Centre. Tell us a bit about your role and what a typical day looks like.

I am a CyberPsychologist and Director of the RCSI CyberPsychology Research Centre, I am a Distinguished Professor of the Practice of Cyber Analytics of the Asia-Pacific Institute for Resilience and Sustainability (AIRS), which is jointly anchored at Swansea University’s Network Science Research Centre and Hawaii Pacific University.

The CyberPsychology Research Centre exists to provide analysis, insight and leadership in understanding the benefits, risks and applications of current and emerging human-technology interfaces. Our vision is that our research centre will become a global leader in producing research and supporting education and intervention at the intersection of psychology and technology.

Read More
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (1048 reads)

TDFCon 2015 – Middlesbrough 15th May

Wednesday, April 29, 2015 (13:17:10)
On May 15th 2015, Forensic Focus will be attending TDFCon – the Teesside Digital Forensics Conference – at Teesside University, Middlesbrough. If there are any topics you would like us to cover in-depth, or if there are any speakers you think we should interview, please let us know in the comments.

TDFCon has been running for eleven years, and this year’s conference is being sponsored by Avatu and the Chartered Society of Forensic Sciences. There will be a number of international speakers flying in for the conference, which will provide an in-depth look at current academic research in the field, as well as a wide range of industry presentations. There will also be opportunities to discuss research one-to-one with the speakers themselves, and a series of workshops where attendees can find out more about the subjects being presented.

Read More
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (1060 reads)

Nominate Your Peers! Secure View Gives Back

Wednesday, April 29, 2015 (09:51:27)
In honor of Thursday's release of Secure View 4, Susteen will be donating Four free Secure View kits to Law Enforcement agencies in need. Secure View Advanced Mobile Forensic software can acquire data from thousands of phones with industry leading analytics. Although Susteen pioneered mobile forensics and has been around for over 20 years, many do not know that Susteen stands for "Success for Teens."

First Ever Advanced Cross Case Analytics (ACCE) released with Secure View 4

Tuesday, April 28, 2015 (08:18:31)
First Ever Advanced Cross Case Analytics (ACCE) for mobile forensics will debut with Secure View 4!

Irvine, Ca. 4/27/2015

With the launch of Secure View 4 this Thursday, April 30th, 2015 new and current users will have access to the first ever ACCE analytics for mobile forensics called SV Detect. This breakthrough will allow users to increase conviction rates and build new evidence against past crimes. SV Detect will allow Secure View users to run newly acquired data against their old reports. This fantastic feature allows a user to run newly acquired contacts and text messages through old cases to match up data. This tool is a feature that can be turned on or off at your discretion. SV Detect is just one of the new features to be launched with Secure View 4.

ReclaiMe Introduces BTRFS Recovery

Monday, April 27, 2015 (13:25:32)
ReclaiMe – the only data recovery vendor providing BTRFS recovery

BTRFS is a filesystem from Linux which has several distinctive features such as copy-on-write, checksumming, data scrubbing, and more.

ReclaiMe Data Recovery Company integrated a new data recovery algorithm using which you can recover data from a failed BTRFS volume in their data recovery software - ReclaiMe Pro.