±Partners and Sponsors

±Your Account


Nickname
Password


Forgotten password/username?


Membership:
New Today: 0
New Yesterday: 2
Overall: 26790
Visitors: 54

±Follow Forensic Focus

Join our LinkedIn group

Subscribe to news

Subscribe to forums

Subscribe to blog

Subscribe to tweets

Digital Forensics, Computer Forensics, eDiscovery

Search on This Topic: Announcements

[ Go to Home | Select a New Topic ]

Investigating the Dark Web – The Challenges of Online Anonymity for Digital Fore

Monday, July 28, 2014 (15:58:38)
The recent rise in the number of people who suspect they may be being tracked on the internet, whether by government agencies, advertisers or nefarious groups, has led to increased interest in anonymising services such as TOR.

TOR, or The Onion Router, conceals a user’s identity and network activity from others who wish to uncover information about them. It has been used by journalists and individuals working under strict regimes, and by whistleblowers and others who need to be able to disseminate information both safely and anonymously.

Of course, TOR also has its applications in the criminal world, and it is perhaps for this that it is most well known. Silk Road, one of its largest sites, found itself under press scrutiny when the FBI shut it down in October 2013...

Read More

Interview with Oleg Fedorov, CEO and Founder, Oxygen Software

Thursday, July 24, 2014 (10:48:17)
Oleg, please tell us about your role at Oxygen Software and why you decided to set up the company in 2000.

I started out as a developer, but in 1999 I decided that I needed a new challenge since I wanted to grow as a professional. I was advised to look into the market of Shareware and so I quit all my jobs and started Oxygen Software. Soon after, my friend Oleg Davydov joined me and we began to try different software markets.

That was the time of the “Matrix” cult movie. Do you remember the phones used by the actors? They were custom ones, but very similar to the Nokia 7110. It was a revolutionary device, the first phone that was able to store several phone fields for every contact and had advanced calendar features. We at Oxygen were lucky that we released Oxygen Phone Manager for Nokia 7110 before Nokia included its support into their official PC Suite. This product gave us a great start...

Read More

Forensic Focus Forum Round-Up

Friday, July 18, 2014 (15:10:05)
Welcome to this round-up of recent posts to the Forensic Focus forums.

Forum members discuss the best way to retrieve Facebook profile data.

What does it mean when a mail header shows two X-Originating IP addresses?

Forensic imaging of a USB with a corrupt file system.

Forum members discuss how to find an XLS file on a computer that has been reformatted.

Unexpected SQLite field data in WhatsApp databases provokes discussion on the forum.

Forum members discuss how to process several thousand images on a hard drive.

Do you have any recommendations for mobile forensic tools? Add yours in the forum.

What is the most effective way to extract data from a Nokia Lumia 520?

Finding and Analyzing Document Files with IEF

Tuesday, July 15, 2014 (14:29:24)
Analyzing documents to prove their authenticity has been one of the cornerstones of computer forensics and is still an important part of the investigative process to this day. Whether you’re investigating documents in a fraud case, an IP theft, or from a malware/phishing intrusion, proper document analysis is essential to help uncover the truth in many investigations.

New to Internet Evidence Finder v6.4 is the ability to recover and analyze documents found on a suspect’s PC. Available with the OS & Business Apps module, IEF is now able to recover Microsoft Office documents including Excel, PowerPoint, Word and PDF documents...

Read More (Magnet Forensics)

Job Vacancies: Various Digital Forensics Posts (Blackthorn, London)

Monday, July 14, 2014 (14:41:25)
Due to continued growth and expansion Blackthorn are looking to recruit to a number of digital forensic positions in London.

We are particularly looking for the following:

Computer Analysts (3 years plus experience)
Computer Analysts (1-2 years experience)
Mobile Device Specialists (1 year plus experience)
Experienced Cell Site Specialists

We would also like to hear from you if you have skills in areas such as Incident Response and Network Forensics. Ideally you will have experience of law enforcement and corporate work but candidates will be considered if they have experience in either...

Read More