±Forensic Focus Partners
New Today: 0
New Yesterday: 3
±Follow Forensic Focus
· TSFIC 2015 – Myrtle Beach 31st May – 3rd June
· Forensics Europe Expo 2015 – Recap
· Capturing RAM Dumps and Imaging eMMC Storage on Windows Tablets
· TDFCon 2015 – Middlesbrough 15th May
· Electronic Voiceprints: The Crime Solving Power of Biometric Forensics
· DFRWS Europe 2015 Annual Conference – Recap
· DFRWS EU 2015 – Dublin 23rd – 26th March
· SQLite Database Forensics – ‘Sleep Cycle’ Case Study
· Data Recovery As A Medium For Email Forensics
Page 3Back to top Back to main Skip to menu
Irvine, Ca. 4/27/2015
With the launch of Secure View 4 this Thursday, April 30th, 2015 new and current users will have access to the first ever ACCE analytics for mobile forensics called SV Detect. This breakthrough will allow users to increase conviction rates and build new evidence against past crimes. SV Detect will allow Secure View users to run newly acquired data against their old reports. This fantastic feature allows a user to run newly acquired contacts and text messages through old cases to match up data. This tool is a feature that can be turned on or off at your discretion. SV Detect is just one of the new features to be launched with Secure View 4.
BTRFS is a filesystem from Linux which has several distinctive features such as copy-on-write, checksumming, data scrubbing, and more.
ReclaiMe Data Recovery Company integrated a new data recovery algorithm using which you can recover data from a failed BTRFS volume in their data recovery software - ReclaiMe Pro.
Speakers: Paul Slater, Director of Forensic Solutions EMEA at Nuix and Troy Bettencourt, Sales Engineer NA at Nuix
Investigators who are working with legacy digital forensic tools and faced with shrinking budgets often find it hard to see how they can keep up. Join this webinar to find out how you can work smarter, not harder, during a forensic investigation. Learn how to simplify, streamline and automate your workflows, analytics and review processes to help you deal with growing volumes of digital evidence and shrinking budgets.
We'll show you how you can process more files and formats, integrate your workflows, and work collaboratively with technical investigators and subject matter experts to quickly get to the essence of the evidence.
Register now at http://info.nuix.com/policing-digital-crimes-of-today-FF.html
How would you acquire data from a password protected MS Surface Pro?
Forum members discuss malware risk mitigation on forensic workstations.
How can a split E01 image of a Windows 7 Enterprise SP1 physical disk protected by BitLocker be mounted? Forum members come up with a solution.
Minime2k9 asks how to find evidence of remote desktop login outside of the Windows Security log.
Should you keep a chain of custody for forensic investigations in corporate environments? Add your thoughts on the forum.
Forum members discuss a timestamp discrepancy on an acquired Linux machine.
How do you recover deleted Snapchat images on an iPhone 4S? Chime in on the forum.
Forum member liguoroa gives feedback on BlessHex editor.
Sure. As Chief Security Officer for cybersecurity I'm involved in ensuring security of the state. That means we have mostly 400 locations for different applications, for example schools, healthcare industry, roads, taxes, police and so on. So the perimeter I have to secure is quite broad. The problem we have is that I have to check all the risks involving this perimeter and also understand the needs of the business, because every business has different needs. So we have to match guidelines also from the Swiss contribution, and ISO 27001 standards, to define policies and roles. So that's my main job and that takes a lot of time because we have to be compliant.
When hard drive is turned off, its sensitive heads must be parked at a "safe place". This safe area, must be designed in such way, that read/write heads can't be damaged and that valuable data is not threatened in any way.
Q: Why not take down the hundreds of sites now selling stolen credit cards and identity data?
For starters, it’s not always so easy to take these sites offline. Many of them rely on domain name registrars that routinely ignore abuse requests. The same goes for the organizations hosting a number of these unsavory markets.
Read More (KrebsOnSecurity)
The courses are delivered through the (ISC)2 Learning Center, a centralized platform that allows learners to access CCFP training materials, educational resources and manage their (ISC)2 online training in one environment.
My role at Sytech predominantly involves the extraction and analysis of embedded devices, such as mobile phones, tablets, satellite navigation systems, games consoles, unknown devices etc. The examinations I am involved in vary considerably and range from indecent images of children (IIOC) to providing assistance in murder investigations. Working for a private organisation, such as Sytech, allows me to experience both prosecution and defence based cases.
What first made you interested in digital forensics as a field?
It was the varied nature of the work accompanied by the opportunity to make a difference that attracted me to the field of Digital Forensics.