±Forensic Focus Partners

Become an advertising partner

±Your Account


Nickname
Password


Forgotten password/username?


Membership:
New Today: 3
New Yesterday: 11
Overall: 28692
Visitors: 78

±Follow Forensic Focus

Join our LinkedIn group

Subscribe to news

Subscribe to forums

Digital Forensics, Computer Forensics, eDiscovery

Search on This Topic: News

[ Go to Home | Select a New Topic ]

Guidance Software EnCase® Wins 2015 SC Awards Europe for Best Computer Forensics

Tuesday, June 30, 2015 (14:03:43)
Guidance Software, Inc. (GUID) has had its EnCase® software named "Best Computer Forensics Solution" at the 2015 SC Awards Europe Awards. Each year, hundreds of products are entered in the Excellence Awards: Threat Solutions categories. Each product is judged by a panel representing a cross-section of SC Magazine readership, which is comprised of large, medium and small enterprises from all major vertical markets including financial services, healthcare, government, retail, education and other sectors. This recognition was the latest in a series of awards that Guidance Software has recently earned.

Guidance Software’s EnCase® software solution is a powerful, judicially accepted platform that provides the foundation for corporations, government agencies and law enforcement to conduct thorough and effective digital investigations of any kind, including intellectual property theft, incident response and compliance—all while maintaining the forensic integrity of the data.

Solution for the Jammed Motor on Hard Drives

Tuesday, June 30, 2015 (09:12:35)
Introduction of the fluid bearings hasn't completely eliminated all possibilities for the motor failures during HDD operation. Currently, the biggest problem in this area is the jammed spindle in the bearing housing.

This defect occurs mostly due to shocks or falls of HDD during the operation. Hard drives from Seagate 7200.11 and 7200.10 families are especially prone to this type of malfunction.

HddSurgery, as a company which develops tools and "know-how" solutions in data recovery, worked on solving the HDD spindle motor problem for almost two years.

Webinar: Analyzing Evidence From Mobile Devices, Including Hidden/Deleted Data

Friday, June 26, 2015 (09:18:50)
A recording of the webinar "Analyzing Evidence From Mobile Devices, Including Hidden and Deleted Data" is now online and available to view here.

Join the forum discussion here.
View the webinar on YouTube here.
Read a full transcript here.
  • Posted by: jamie
  • Topic: News
  • Score: 0 / 5
  • (1728 reads)

Major Cybercrime Ring Dismantled By Joint Investigation Team

Thursday, June 25, 2015 (14:13:24)
A joint investigation team consisting of investigators and judicial authorities from six different European countries, supported by Europol and Eurojust, has taken down a major cybercriminal group during a coordinated action in Ukraine. With on-the-spot support from Europol, Austrian and Belgian law enforcement and judicial authorities, the action in Ukraine on 18 and 19 June resulted in the arrest of five suspects, eight house searches in four different cities, and the seizure of computer equipment and other devices for further forensic examination.

The aim of this JIT was to target high-level cybercriminals and their accomplices who are suspected of developing, exploiting and distributing Zeus and SpyEye malware - two well-known banking Trojans - as well as channelling and cashing-out the proceeds of their crimes.

Read More (Europol)
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (2067 reads)

Computer Ransom Hacker Jailed In New York

Thursday, June 25, 2015 (09:59:33)
A Swedish man who created malware which infected half a million computers around the world has been jailed in New York.

Alex Yucel, 25, owned the Blackshade organisation which sold sophisticated software to thousands of hackers in more than 100 countries. The program allowed hackers to access private photographs, passwords, and spy on victims through webcams. Data could also be locked, with victims then sent "ransom notes" to extort money.

In some cases, hackers obtained access to webcams to spy inside private homes, and victims could also be harassed using messages which computers would read aloud.

Read More (Sky News)
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (2009 reads)

Inside Scotland Yard's Communications Intelligence Unit

Thursday, June 25, 2015 (08:08:18)
At a police building in south London, which I've been asked not to identify, I'm led through security gates, into the lift, up several floors and along a corridor to Scotland Yard's Communications Intelligence Unit.

A sign on the door says No Unauthorised Access, but police have invited me in because they want to set the record straight. What they do here is not about snooping on our calls and emails, they say - it's about saving lives. A whiteboard lists the priority cases, known as Grade Ones, where there is an immediate threat to someone's life...

Read More (BBC News)

Job Vacancy: MediaClone Seeking a Sales Rep - Los Angeles, CA

Wednesday, June 24, 2015 (13:31:48)
MediaClone is seeking a Sales Rep. to sell the MediaClone Forensic line of products to a wide variety of potentials customers, including many US government branches, and local, state, and federal law enforcement agencies, as well as e-Discovery and legal support services, Corporate Cyber Security departments. The company is also looking to develop online sales channels for the IT markets and pursue sales relationships with many IT resellers.

The ideal candidate is a professional, with a confident and pleasant phone presence, with experience conducting on-line presentations and product demonstrations. The candidate should also have extensive knowledge of and at least 5 years’ experience selling products in computer forensic markets.

Read More
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (1624 reads)

Webinar: Computer Forensics and the Cloud - Rising Above The Storm

Tuesday, June 23, 2015 (15:09:06)
Date: Tuesday June 30, 2015
Time: 10:00am CST / 4:00pm BST / 3:00pm GMT

Cloud Forensics brings unique concerns regarding acquisition, preservation, and analysis of potential digital evidence. Examiners will find less allocated evidence left behind on a system when a subject is using the cloud. Information stored in the cloud, can be stored anywhere in the world, and based on its location or country, privacy laws could be an issue. Establishing a chain of custody is difficult or almost impossible and its integrity and authenticity cannot be fully determined. Criminals are using free and paid, convenient storage options, like Google Drive and Dropbox, to store illegal photos, files, and to launch malware attacks. Additionally, these cloud sites can be used to share malware infected files that can compromise systems. The installed malware is used to siphon data from computers out and onto Google, Dropbox, OneDrive, etc.

In this webinar, attendees will learn what to expect when examining a local computer that has been used to store information in the cloud. Learn the best ways to access artifacts that may relate to cloud usage and can be key evidence to your investigation.

Register now at http://bit.ly/1IP2pDu
  • Posted by: jamie
  • Topic: News
  • Score: 0 / 5
  • (1527 reads)

The Future of Mobile Forensics

Tuesday, June 23, 2015 (12:23:23)
Most would agree that the golden age of mobile forensics is over. There is no longer an easy way to get through the passcode in new iOS devices running the latest version of iOS. Chip-off acquisition is dead for iOS devices due to full-disk encryption, while physical acquisition of Apple hardware is dead since the introduction of 64-bit devices and versions of iOS 8 that cannot be jailbroken.

Blackberries were highly resistant to chip-off acquisition from the beginning, and Android is getting there quickly. In this whitepaper, we will look into the current state of mobile forensics for the different platforms and devices, analyze current trends and attempt to predict how mobile forensics will look in the years ahead.

To gather these predictions, Belkasoft analyzed state-of-the-art tools, methods and hardware offered by leading manufacturers, and interviewed experts working for manufacturers of digital forensic products.

Read More
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (1653 reads)

TSFIC 2015 – Recap

Monday, June 22, 2015 (17:14:40)
This article is a recap of some of the main highlights from the Techno Security and Forensics Investigations Conference (TSFIC) held in Myrtle Beach, South Carolina, from the 31st of May until the 3rd of June 2015.

The conference began at midday on Sunday 31st of May, with six main strands running throughout the duration of the event. Attendees received a colour-coded programme which allowed them to easily see which of the talks were part of the Audit, Forensics, Information Security, Investigations, Cellebrite Lab or Nuix Lab parts respectively.

The Information Security session by Chris Pogue was one of the talks that introduced the conference. Pogue discussed the recent spike in reported data breaches around the world, and questioned whether more data breaches had actually been happening in recent years, or whether the media were just reporting on them more frequently.

Read More
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (1289 reads)