±Forensic Focus Partners

Become an advertising partner

±Your Account


Forgotten password/username?

New Today: 1
New Yesterday: 2
Overall: 28707
Visitors: 52

±Follow Forensic Focus

Join our LinkedIn group

Subscribe to news

Subscribe to forums

Page 3

Search on This Topic: News

[ Go to Home | Select a New Topic ]

Webinar: UFED Cloud Analyzer - Unlock actionable intelligence from cloud data

Monday, June 15, 2015 (08:03:41)
Date: Tuesday June 16, 2015

Registration: http://go.cellebrite.com/cloud_web_jun2015_reg

Presenter: Shahaf Rozanski, Senior Forensics Product Manager, Cellebrite

With 58% of people using their mobile device to access social media, a wealth of personal information is uploaded onto these social networks that provides a goldmine of potential evidence. In this webinar, learn how to:

- Perform timely extraction of private user data from key social media, webmail and cloud storage sources: Facebook, Twitter, Gmail, Google Drive, Dropbox, Kik, etc.
- Dynamically visualize and analyze large data sets in a unified format to bring key insights to the surface quickly
- Share relevant evidence or intelligence via easy-to-read, custom reports or export data to other analytical tools for deeper investigation

The webinar ends with a Q&A session. Register now at http://go.cellebrite.com/cloud_web_jun2015_reg
  • Posted by: jamie
  • Topic: News
  • Score: 0 / 5
  • (1339 reads)

Researchers Extract Personal Data From Smartwatches

Friday, June 12, 2015 (08:20:30)
Researchers at the University of New Haven have shown that they can extract personal information from the LG G Watch and from the Samsung Gear 2 Neo. Specifically, they retrieved calendar, contacts and pedometer data from the G Watch, along with the watch user's email address. On the Gear 2 Neo, they got health, email, messages and contacts data. None of it was encrypted.

"It was not very difficult to get the data, but expertise and research was required," said Ibrahim Baggili, director of the university's Cyber Forensics Research and Education Group (UNHCFREG).

Read More (Cnet)
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (2323 reads)

US Brings Case Against Alleged Cyber-Espionage Perpetrators

Wednesday, June 10, 2015 (14:06:04)
On a wall facing dozens of cubicles at the FBI office in Pittsburgh, five guys from Shanghai stare from “Wanted” posters. Wang Dong, Sun Kailiang, Wen Xinyu, Huang Zhenyu, and Gu Chunhui are, according to a federal indictment unsealed last year, agents of China’s People’s Liberation Army Unit 61398, who hacked into networks at American companies—U.S. Steel, Alcoa, Allegheny Technologies (ATI), Westinghouse—plus the biggest industrial labor union in North America, United Steelworkers, and the U.S. subsidiary of SolarWorld, a German solar-panel maker.

Over several years, prosecutors say, the agents stole thousands of e-mails about business strategy, documents about unfair-trade cases some of the U.S. companies had filed against China, and even piping designs for nuclear power plants—all allegedly to benefit Chinese companies.

Read More (MIT Technology Review)
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (1777 reads)

International Operation Dismantles Criminal Group of Cyber-Fraudsters

Wednesday, June 10, 2015 (11:51:10)
Yesterday, a joint international operation led to the dismantling of a group of cybercriminals active in Italy, Spain, Poland, the United Kingdom, Belgium and Georgia, who are suspected of committing financial fraud involving email account intrusions.

The operation resulted in the arrest of 49 suspected members of the criminal group, 58 properties were searched, and authorities seized laptops, hard disks, telephones, tablets, credit cards and cash, SIM cards, memory sticks, forged documents and bank account documents.

Read More (Europol)
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (2078 reads)

Start With the Exam Outline for CCFP Digital Forensics Certification

Wednesday, June 10, 2015 (09:48:04)
The Certified Cyber Forensics Professional (CCFP) certification is the only global cyber forensics credential that provides a comprehensive validation of your knowledge and skills as a digital forensics expert. Developed by (ISC) 2 , a leader in the information security certification market, CCFP is for those who have been working in the field and would like to take the next step and apply their cyber forensics expertise to a variety of challenges.

In order to get started and become CCFP certified, download the CCFP Exam Outline to learn what you need to know to sit for the exam.

  • Posted by: (ISC)2
  • Topic: News
  • Score: 0 / 5
  • (2268 reads)

Feds Want to ID Web Trolls Who ‘Threatened’ Silk Road Judge

Tuesday, June 09, 2015 (10:47:06)
On Dark Web sites like the Silk Road black market and its discussion forums, anonymous visitors could write even the most extreme libertarian and anarchist statements without fear. The rest of the internet, as a few critics of the US judicial system may soon learn, isn’t quite so free of consequences.

Last week the Department of Justice issued a grand jury subpoena to the libertarian media site Reason.com, demanding that it identify six visitors to the site. The subpoena letter, obtained and published by blogger Ken White, lists trollish comments made by those six Reason readers that—whether seriously or in jest—call for violence against Katherine Forrest, the New York judge who presided over the Silk Road trial and late last month sentenced Silk Road creator Ross Ulbricht to life in prison...

Read More (Wired)
  • Posted by: jamie
  • Topic: News
  • Score: 0 / 5
  • (2153 reads)

Interview with Adam Hovak, Software Product Manager, Exelis

Tuesday, June 02, 2015 (18:40:58)
Adam, you’re a Software Product Manager at Exelis. Could you tell us a bit about what the company does, and what your own role involves?

We’ve had some pretty big changes at Exelis in the last few weeks; As of May 29th 2015, Exelis was officially acquired by Harris Corporation. The combined Harris/Exelis acquisition (called Harris) is a pretty large defense company, that seems to do everything from night vision goggles to the next generation FAA control system for commercial flights, to communication radios. Our office in Rome, NY focuses primarily on information assurance and information protection. We started out years ago by building transfer devices for the Department of Defense (DoD) that would allow the automated transfer of data between networks of differing classification levels. In order to do our job effectively, we’ve had to understand all types of data.

Read More
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (2549 reads)

Passware Kit 2015v.3 Acquires Files From OneDrive & Extracts Windows Phone Data

Monday, June 01, 2015 (21:20:41)

* Acquisition of files from Microsoft OneDrive
* Data extraction from Windows Phones
* Hardware acceleration with TACC2

(ISC)2 Provides Official Guide to Cyber Forensics Certification

Friday, May 29, 2015 (17:47:55)
Cyber forensic knowledge requirements have expanded and evolved just as the nature of digital information has, requiring cyber forensics professionals to understand far more than just hard drive and intrusion analysis.

The Certified Cyber Forensics Professional (CCFP) from (ISC) 2 assures that certification holders have the necessary breadth and depth of knowledge and thinking skills needed to address today’s cyber forensic challenges. CCFP indicates expertise in the forensics techniques and procedures, standards of practice, and legal and ethical principles to assure accurate, complete, and reliable digital evidence admissible in a court of law. It also indicates the ability to apply forensics to other information security disciplines, such as e-discovery, malware analysis, or incident response.

  • Posted by: (ISC)2
  • Topic: News
  • Score: 0 / 5
  • (4380 reads)

TDFCon 2015 – Recap

Friday, May 29, 2015 (16:23:56)
TDFCon presents an opportunity for students from Teesside University and elsewhere to come together and discuss their research with industry professionals, law enforcement representatives and fellow students.

The theme for this year’s programme was ‘The Future of Digital Forensics’, and the topics discussed certainly fulfilled the brief, looking at how current trends in computer crime are informing digital forensics and vice versa, as well as how digital forensics education is changing and shaping the development of future forensic examiners.

The day began with a discussion of SCADA security in the UK and whether it is sufficient to protect against network security breaches. Jack McIntyre spoke about how SCADA is unprotected at the device level, and uses web applications which are often vulnerable to attacks such as authentication bypass or SQL injection.

Read More
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (2792 reads)