±Forensic Focus Partners

Become an advertising partner

±Your Account


Forgotten password/username?

Site Members:

New Today: 1 Overall: 29233
New Yesterday: 11 Visitors: 107

±Follow Forensic Focus

Forensic Focus Facebook PageForensic Focus on TwitterForensic Focus LinkedIn GroupForensic Focus YouTube Channel

Subscribe to news

Subscribe to forums

Digital Forensics, Computer Forensics, eDiscovery

Search on This Topic: News

[ Go to Home | Select a New Topic ]

XRY v6.15 Is Launched

Friday, October 09, 2015 (13:19:14)
XRY the pioneering mobile forensics tool from MSAB has just been updated to version 6.15

With support for the latest Apple iPhone 6s and 6s Plus devices, iOS9 and also Android 6 Marshmallow operating systems, to ensure digital forensic examiners can stay ahead.

XRY v6.15 has 16,463 mobile forensic profiles supported; including 847 of the latest smartphone app versions; such as WhatsApp (2.12), Snapchat (9.15) and Facebook Messenger (38.0) to list just a few of the apps supported.

Secure View Increases Advanced Analytics

Thursday, October 08, 2015 (14:57:50)
Secure View 4 adds new and advanced analytics to their suite of mobile forensic analytical tools, including deep Deleted Data acquisitions, pincode/passcode breaking and multi-link analysis. Grants are available.

Interview with Jamie Levy, Core Developer, Volatility Project

Thursday, October 08, 2015 (12:51:45)
Jamie, you’re currently working on the Volatility project. Tell us a bit more about the project and its aims.

The Volatility Framework is an open source project that allows people to analyze memory samples from various operating systems and hardware architectures. It's written in Python, which allows you to take advantage of the abundance of libraries that currently exist for forensic and reverse engineering purposes; this also allows you to run it from any operating system that has Python installed. Volatility allows you to view the memory sample as the operating system sees it (similar to WinDBG), but it also allows you to carve for objects in unallocated memory (that are inaccessible to traditional debuggers). Volatility has an easy to use API, so you can easily extend it to your needs and build custom plugins for new artifacts as well.

Read More
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (429 reads)

Nuix promotes international cybersecurity adviser Stuart Clarke to cyber-CTO

Wednesday, October 07, 2015 (14:32:56)
Nuix, a company that protects, informs, and empowers society in the knowledge age, today promoted internationally respected information security expert Stuart Clarke to the role of Chief Technology Officer for Cybersecurity.

Clarke joined Nuix in October 2013 as Director of Cybersecurity and Investigations. During his employment with Nuix, Clarke has advised the United Nations’ peak cybersecurity body ITU and provided cybersecurity training for over 60 computer emergency response teams from governments and regulators around the world. He also led the development of Nuix Incident Response, an innovative investigative tool that delivers deep insights into the cause and scope of data breaches.

Review - ReclaiMe Pro

Wednesday, October 07, 2015 (13:11:24)
I would be tempted to argue that you can tell a lot about a piece of software by how easy it is to install.

There are times when finding, downloading and installing a product update feels like repeatedly banging your head on a brick wall: constant freezing, confused Windows popups, license key errors...

Then there are times when you click 'Download', then 'Install', then tick 'Yes' in the little box, and boom! The software appears.

I am pleased to be able to report that the installation process of ReclaiMe Pro falls into the second category. It can be found on the Download page of the website, and it sets itself up in just a few minutes.

After that, of course, it's time to get down to business.

Read More
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (715 reads)

Advanced SQLite Analytics with Belkasoft Evidence Center (Part II)

Wednesday, October 07, 2015 (08:49:03)
In the first part of our series on SQLite analysis we talked about accessing corrupted SQLite files and recovering deleted SQLite records from the freelist. Today we will cover two more important topics: SQLite write-ahead log (WAL) and unallocated space of SQLite databases, and how to analyze them using Belkasoft Evidence Center.

FT Cyber Security Summit 2015 – Recap

Wednesday, September 30, 2015 (12:33:02)
This article is a recap of some of the main highlights from the FT Cyber Security Summit, which took place in London on Tuesday the 22nd of September 2015.

Conference Highlights

The day began with a keynote speech from Ed Vaizey MP, the UK Minister of State for Culture and the Digital Economy. Vaizey recapped some of the main things EU governments are doing to make cyberspace safer, praising the UK as a “pioneer of the digital age”. He discussed the Cyber Essentials scheme, through which the government helps businesses to create their own cyber security strategies, and also encouraged uptake of an initiative in which business owners can receive free training in cyber security.

Read More
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (1813 reads)

Interview with Cosimo Anglano, Professor, University of Piemonte Orientale

Wednesday, September 30, 2015 (05:56:23)
Cosimo, please tell us about your work as an Associate Professor at the Università del Piemonte Orientale. What does a typical day look like for you?

The University of Piemonte Orientale is a mid-sized University located in Piemonte, in the North-West of Italy. I work in the Computer Science Institute, which is located in Alessandria, one of the three campuses of the university.

As a Professor, my duties are research and teaching. My current research fields are digital forensics and distributed systems. My typical day consists in doing research in the lab (both directly and by coordinating my collaborators), mentoring students, and teaching. At the moment I teach classes in Digital Forensics, in Operating Systems, and in Distributed Systems, both at the undergraduate and at the graduate level.

Read More
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (1644 reads)

Webinar: Summation® & FTK®: Streamline Your E-discovery & Investigative Needs

Tuesday, September 29, 2015 (21:17:04)
A recording of the webinar "Summation® & FTK®: Streamline Your E-discovery & Investigative Needs" is now online and available to view here.

Join the forum discussion here.
View the webinar on YouTube here.
Read a full transcript of the webinar here.
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (1395 reads)

Recovering SQLite Evidence with Belkasoft Evidence Center

Monday, September 28, 2015 (20:15:02)
Much has been said about the different tools to extract, view, and recover SQLite databases. Why is SQLite analysis so important for digital forensics? Why is SQLite not straightforward to investigate? Why use Belkasoft Evidence Center for SQLite analysis? Read along to find out!