±Partners and Sponsors

±Your Account


Nickname
Password


Forgotten password/username?


Membership:
New Today: 0
New Yesterday: 3
Overall: 26785
Visitors: 71

±Follow Forensic Focus

Join our LinkedIn group

Subscribe to news

Subscribe to forums

Subscribe to blog

Subscribe to tweets

Digital Forensics, Computer Forensics, eDiscovery

Search on This Topic: Announcements

[ Go to Home | Select a New Topic ]

Interview with Oleg Fedorov, CEO and Founder, Oxygen Software

Thursday, July 24, 2014 (10:48:17)
Oleg, please tell us about your role at Oxygen Software and why you decided to set up the company in 2000.

I started out as a developer, but in 1999 I decided that I needed a new challenge since I wanted to grow as a professional. I was advised to look into the market of Shareware and so I quit all my jobs and started Oxygen Software. Soon after, my friend Oleg Davydov joined me and we began to try different software markets.

That was the time of the “Matrix” cult movie. Do you remember the phones used by the actors? They were custom ones, but very similar to the Nokia 7110. It was a revolutionary device, the first phone that was able to store several phone fields for every contact and had advanced calendar features. We at Oxygen were lucky that we released Oxygen Phone Manager for Nokia 7110 before Nokia included its support into their official PC Suite. This product gave us a great start...

Read More

Forensic Focus Forum Round-Up

Friday, July 18, 2014 (15:10:05)
Welcome to this round-up of recent posts to the Forensic Focus forums.

Forum members discuss the best way to retrieve Facebook profile data.

What does it mean when a mail header shows two X-Originating IP addresses?

Forensic imaging of a USB with a corrupt file system.

Forum members discuss how to find an XLS file on a computer that has been reformatted.

Unexpected SQLite field data in WhatsApp databases provokes discussion on the forum.

Forum members discuss how to process several thousand images on a hard drive.

Do you have any recommendations for mobile forensic tools? Add yours in the forum.

What is the most effective way to extract data from a Nokia Lumia 520?

Finding and Analyzing Document Files with IEF

Tuesday, July 15, 2014 (14:29:24)
Analyzing documents to prove their authenticity has been one of the cornerstones of computer forensics and is still an important part of the investigative process to this day. Whether you’re investigating documents in a fraud case, an IP theft, or from a malware/phishing intrusion, proper document analysis is essential to help uncover the truth in many investigations.

New to Internet Evidence Finder v6.4 is the ability to recover and analyze documents found on a suspect’s PC. Available with the OS & Business Apps module, IEF is now able to recover Microsoft Office documents including Excel, PowerPoint, Word and PDF documents...

Read More (Magnet Forensics)

Job Vacancies: Various Digital Forensics Posts (Blackthorn, London)

Monday, July 14, 2014 (14:41:25)
Due to continued growth and expansion Blackthorn are looking to recruit to a number of digital forensic positions in London.

We are particularly looking for the following:

Computer Analysts (3 years plus experience)
Computer Analysts (1-2 years experience)
Mobile Device Specialists (1 year plus experience)
Experienced Cell Site Specialists

We would also like to hear from you if you have skills in areas such as Incident Response and Network Forensics. Ideally you will have experience of law enforcement and corporate work but candidates will be considered if they have experience in either...

Read More

Coming apart at the SIEMs...

Wednesday, July 02, 2014 (14:15:14)
Security Information and Event Management (SIEM) systems are all the rage at the moment – and with good cause.

As you are all aware, one item of data does not a case make, it is the combination & correlation between _all_ of the data that creates “evidence” – and here in the SIEM we are seeing the very thinnest separation between forensics and security – if we look at it today it is security, if we look at it tomorrow, it’s forensics.

An SIEM (oft pronounced “seem” – although mostly I like to spell out my TLAs ESS-AYE-EEE-EMM [ with a few notable exceptions ... raid, scuzzy, wizzywig ... but I suspect that shows my age more than anything else ! ] ) is a centralised system that collects information from other systems in the network. This information is typically – but not exclusively – collected from some, or all, of the normal logging of the system...

Read More