±Partners and Sponsors

±Your Account


Nickname
Password


Forgotten password/username?


Membership:
New Today: 1
New Yesterday: 13
Overall: 27119
Visitors: 44

±Follow Forensic Focus

Join our LinkedIn group

Subscribe to news

Subscribe to forums

Subscribe to blog

Subscribe to tweets

Page 2

Search on This Topic: News

[ Go to Home | Select a New Topic ]

Webinar: Getting to Know Oxygen Forensic Passware Analyst

Tuesday, September 09, 2014 (13:49:06)
Date/Time: Tuesday, September 16, 2014 7am PT / 10am ET / 2pm GMT
Duration: 60 minutes
Presenter: Tatiana Pankova, Oxygen Forensics

This free webinar, hosted by Tatiana Pankova of Oxygen Forensics, aims to provide a brief but comprehensive overview of Oxygen Forensic Passware Analyst. Learn how to acquire data from a wide range of mobile platforms, device images and cloud storage as well as decrypt and analyze information from password-protected and encrypted sources in a single smooth workflow.

Register today at https://www3.gotomeeting.com/register/655143102
  • Posted by: jamie
  • Topic: News
  • Score: 0 / 5
  • (813 reads)

The New World of Mobile Investigations: Important Evidence in Third-Party Apps

Monday, September 08, 2014 (13:24:45)
Over the last few years, we have seen a massive shift in the mobile communications market. Smartphones have taken over the world, and mobile users spend the majority of time on their devices emailing, browsing the web, using social media and/or chatting with others using various applications.

Now that the mobile device market has mostly standardized on two operating systems (Android and iOS), we’re seeing a general decline in the variety of handsets and file systems. ‘Device variety’ is becoming less of an issue.

Today’s mobile forensics investigator has a new problem on their hands – recovering and analyzing data contained within thousands of widely-used third-party applications...

Read More (Magnet Forensics)

And there he stood, with a smoking datum in his hand

Friday, September 05, 2014 (09:43:23)
In early December 2008, Clifford Lambert, a retired Los Angeles art dealer, received a call from a New York estate lawyer with news that surely made his 74-year-old heart leap. Lambert was due to inherit some valuable artwork, the man said, from the estate of May Department Stores Co. heiress Florene May Schoenborn, who had died—curiously—in August 1995. Lambert arranged a meeting to discuss the purported details. Days later, three men arrived at Lambert’s home and stabbed him to death in the kitchen of his posh, 4,300-square-foot Palm Springs, Calif. home. They buried his body in the nearby desert.

Six people were ultimately convicted in Lambert’s murder, which was financially motivated. (The man on the phone, as you might expect, was no lawyer.) Much of the evidence against them was found inside their mobile phones...

Read More (Fortune)
  • Posted by: jamie
  • Topic: News
  • Score: 0 / 5
  • (588 reads)

Forensic Analysis of Windows Shellbags

Monday, September 01, 2014 (13:45:46)
While shellbags have been available since Windows XP, they have only recently become a popular artifact as examiners are beginning to realize their potential value to an investigation. In a nutshell, shellbags help track views, sizes and positions of a folder window when viewed through Windows Explorer; this includes network folders and removable devices.

Find out how Shellbags could be important to your digital forensic investigations...

Read More (Magnet Forensics)

Curious about Nuix Web Review and Analytics? Join Nuix's expert webinar series

Friday, August 29, 2014 (09:31:30)
In June this year, Nuix launched Nuix Web Review and Analytics, a powerful web application that makes evidence securely and conveniently available using any modern web browser. This enables organizations to provide secure and compartmentalized access to case data for multiple reviewers, investigators, lawyers, subject matter experts and external parties.

See Nuix Web Review and Analytics for yourself by joining one or both of the upcoming free, expert webinars. Learn how to;

• Process, search and review evidence in a single workflow without converting or transferring data between tools
• Enable investigators, lawyers, subject matter experts, auditors and other non-technical personnel to collaborate on case data
• Protect confidential and sensitive information with granular access controls
• Establish your case position earlier with rapid access to the key facts—see the bigger picture faster