±Forensic Focus Partners

±Your Account


Forgotten password/username?

New Today: 1
New Yesterday: 3
Overall: 28299
Visitors: 126

±Forensic Focus Partner Links

Join our LinkedIn group

Subscribe to news

Subscribe to forums

Page 3

Search on This Topic: News

[ Go to Home | Select a New Topic ]

Thailand warns women who post 'underboob' photos face five years in jail

Tuesday, March 17, 2015 (17:36:17)
Thailand’s military government warned women on Monday against posting photos of the lower half of their breasts – a current social media trend – saying their actions could violate the country’s computer crime laws.

Thailand’s computer crimes act 2007 bans material that causes “damage to the country’s security or causes public panic” or “any obscene computer data which is accessible to the public”.

The culture ministry said offenders faced up to five years in jail, but did not say how they would identify the culprits.

Read More (Guardian)
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (1353 reads)

DFRWS EU 2015 – Dublin 23rd – 26th March

Tuesday, March 17, 2015 (12:15:54)
On Monday 23rd of March 2015, Forensic Focus will be attending DFRWS EU – the European Digital Forensic Research Workshop – at University College Dublin, Ireland. If there are any topics you would particularly like us to cover in-depth, or if there are any speakers you think we should interview, please let us know in the comments.

DFRWS has been running in the USA since 2001 and expanded to Europe in 2013. Organised by some of the most prominent names in digital forensics, including Eoghan Casey, Frank Adelstein and Vassil Roussev, it has grown over the years from a small workshop group to a full conference with a double blind review and printed proceedings.

This year’s European conference runs from the 23rd – 26th of March, and Forensic Focus will be taking notes throughout the workshops and interviewing key figures.

  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (965 reads)

Forensic Focus Forum Round-Up

Monday, March 16, 2015 (11:35:47)
Welcome to this round-up of recent posts to the Forensic Focus forums.

Forum members discuss how to construct a Huffman table in order to display a block of a JPEG image.

What are your tips for getting started in malware forensics? Add your thoughts on the forum.

A strange phenomenon with the recycling bin in Windows Vista leads to discovery of a deleted user account.

Forum members discuss Windows 7 event log exit codes.

How do you image a Surface Pro 3 without removing the SSD?

What are your expectations in terms of data validation in digital forensics cases? Chime in on the forum.

What do you use to extract data from Nokia Lumia phones?

Forum member Informatika asks for experienced P2P examiners to add their thoughts to a case.
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (1387 reads)

Nevis encryption-detection software updated to version 1.5.0

Thursday, March 12, 2015 (10:53:23)
The National Technical Assistance Centre (NTAC) has released a new version of Nevis, their free encryption-detection software.

Nevis runs over seized media to flag any encrypted files or encryption-related files, outputting a report to allow investigators to quickly identify any files of interest.
Nevis is available as a stand-alone Java application and an EnCase 6 EnScript (beta version) with plans for EnCase 7 in the pipeline.

Nevis is available free of charge to all UK Law Enforcement and Government Departments.

If you would like to use Nevis please email esd@ntac.gsi.gov.uk for details and download link.
  • Posted by: mykulh
  • Topic: News
  • Score: 0 / 5
  • (2117 reads)

March 26 Webinar to Discuss Being an Expert Witness in Cyber Investigations

Tuesday, March 10, 2015 (10:07:26)
With data breaches and data leakage incidents becoming front page news, cyber investigations are taking on more importance within organizations. This calls for a new set of skills to be developed such as the ability to work with all levels of law enforcement, lawyers and attorneys and within the judicial system. Many of these investigations will call for the cybersecurity practitioner to be a witness and give testimony.

What's the best way to do this to protect yourself and the organization, while also providing the information that will help law enforcement and the justice system to get the information they need?
  • Posted by: (ISC)2
  • Topic: News
  • Score: 0 / 5
  • (2011 reads)

Magnet Forensics Expands Support in EMEA

Friday, March 06, 2015 (11:30:01)
Waterloo, ON., March 4, 2015 - Magnet Forensics is pleased to introduce Carl Tinker as the new Business Development & Channel Manager for Europe, the Middle East, and Africa (EMEA). Carl joins the Magnet team to provide focused support for our resellers and rapidly expanding customer base in the region.

“I’m excited that Carl has joined us to lead our sales and marketing efforts in EMEA. Carl has an excellent track record and reputation within the digital forensics industry,” said Adam Belsher, CEO at Magnet Forensics. “Our business in the EMEA markets has grown quickly in the past 2 years, and we felt it was extremely important to find an experienced business leader to provide excellent service to our customers and partners in the region.”

Secure View Mobile Forensics and Belkasoft Announce Partnership

Wednesday, March 04, 2015 (12:22:45)
Susteen Inc, and Belkasoft are happy to announce their new partnership. This partnership will allow respective users of both Susteen’s Secure View cell phone forensic software and Belkasoft's computer forensic software to receive discounts on each other's offerings. Both companies offer industry leading tools to law enforcement, military, government and corporate users. This partnership will strengthen the ability for users of both products to manage their forensic cases and increase their forensic capabilities.

Head replacement tools from HddSurgery

Wednesday, February 25, 2015 (13:18:57)
Introduction to head replacement process

Head replacement process refers to the process of replacing defective HDD heads with the heads from identical and functional hard disk drive. This process must be performed in order to recover data from disks that have suffered from head crush failure.

Process of replacing damaged HDD heads with functional ones is pretty complex task, especially if you consider risk of damaging HDD platters, which may cause permanent data loss. Various methods and techniques were used to perform head replacement process, with different percentage of success and high chances that something will go wrong.

Belkasoft Adds Forensic Support for Windows Phone 8.1

Thursday, February 19, 2015 (12:08:29)
Belkasoft updates its digital forensic solution, Belkasoft Evidence Center 2015, with the ability to perform forensic analysis of Windows Phone 8.1 images acquired via JTAG flashers and Cellebrite UFED hardware.

The new release enables automated extraction, discovery and analysis of user data available in chip-off dumps acquired from mobile devices running Windows Phone 8 and 8.1. Supported data includes Web browsing histories, contacts, call logs, chats, instant message conversations, cached social network communications, screenshots of background applications, and many other types of data.

IEF Artifact Updates Have Become a More Frequent Thing

Wednesday, February 18, 2015 (14:52:08)
To stay on top of the rapidly evolving app landscape (and ensure IEF users continue to find as much digital evidence as possible in their investigations), the Magnet Forensics team has started to release more frequent artifact updates, adding to the list of hundreds of artifacts that IEF supports on computers, smartphones and tablets.

New this month, we have released support for a number of native iOS applications including Owner Information, Saved Wi-Fi Profiles, Saved Bluetooth Devices, Spotlight Searches, Word Dictionary, Installed Applications, Calendar Events, Deleted Notes, and Contacts. This new update is available now to customers who have added the mobile artifacts module to their license...

Read More (Magnet Forensics)