±Forensic Focus Partners

Become an advertising partner

±Your Account


Forgotten password/username?

New Today: 7
New Yesterday: 4
Overall: 28829
Visitors: 47

±Follow Forensic Focus

Join our LinkedIn group

Subscribe to news

Subscribe to forums

Page 3

Search on This Topic: News

[ Go to Home | Select a New Topic ]

Inside Scotland Yard's Communications Intelligence Unit

Thursday, June 25, 2015 (08:08:18)
At a police building in south London, which I've been asked not to identify, I'm led through security gates, into the lift, up several floors and along a corridor to Scotland Yard's Communications Intelligence Unit.

A sign on the door says No Unauthorised Access, but police have invited me in because they want to set the record straight. What they do here is not about snooping on our calls and emails, they say - it's about saving lives. A whiteboard lists the priority cases, known as Grade Ones, where there is an immediate threat to someone's life...

Read More (BBC News)

Job Vacancy: MediaClone Seeking a Sales Rep - Los Angeles, CA

Wednesday, June 24, 2015 (13:31:48)
MediaClone is seeking a Sales Rep. to sell the MediaClone Forensic line of products to a wide variety of potentials customers, including many US government branches, and local, state, and federal law enforcement agencies, as well as e-Discovery and legal support services, Corporate Cyber Security departments. The company is also looking to develop online sales channels for the IT markets and pursue sales relationships with many IT resellers.

The ideal candidate is a professional, with a confident and pleasant phone presence, with experience conducting on-line presentations and product demonstrations. The candidate should also have extensive knowledge of and at least 5 years’ experience selling products in computer forensic markets.

Read More
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (2745 reads)

Webinar: Computer Forensics and the Cloud - Rising Above The Storm

Tuesday, June 23, 2015 (15:09:06)
Date: Tuesday June 30, 2015
Time: 10:00am CST / 4:00pm BST / 3:00pm GMT

Cloud Forensics brings unique concerns regarding acquisition, preservation, and analysis of potential digital evidence. Examiners will find less allocated evidence left behind on a system when a subject is using the cloud. Information stored in the cloud, can be stored anywhere in the world, and based on its location or country, privacy laws could be an issue. Establishing a chain of custody is difficult or almost impossible and its integrity and authenticity cannot be fully determined. Criminals are using free and paid, convenient storage options, like Google Drive and Dropbox, to store illegal photos, files, and to launch malware attacks. Additionally, these cloud sites can be used to share malware infected files that can compromise systems. The installed malware is used to siphon data from computers out and onto Google, Dropbox, OneDrive, etc.

In this webinar, attendees will learn what to expect when examining a local computer that has been used to store information in the cloud. Learn the best ways to access artifacts that may relate to cloud usage and can be key evidence to your investigation.

Register now at http://bit.ly/1IP2pDu
  • Posted by: jamie
  • Topic: News
  • Score: 0 / 5
  • (2226 reads)

The Future of Mobile Forensics

Tuesday, June 23, 2015 (12:23:23)
Most would agree that the golden age of mobile forensics is over. There is no longer an easy way to get through the passcode in new iOS devices running the latest version of iOS. Chip-off acquisition is dead for iOS devices due to full-disk encryption, while physical acquisition of Apple hardware is dead since the introduction of 64-bit devices and versions of iOS 8 that cannot be jailbroken.

Blackberries were highly resistant to chip-off acquisition from the beginning, and Android is getting there quickly. In this whitepaper, we will look into the current state of mobile forensics for the different platforms and devices, analyze current trends and attempt to predict how mobile forensics will look in the years ahead.

To gather these predictions, Belkasoft analyzed state-of-the-art tools, methods and hardware offered by leading manufacturers, and interviewed experts working for manufacturers of digital forensic products.

Read More
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (2134 reads)

TSFIC 2015 – Recap

Monday, June 22, 2015 (17:14:40)
This article is a recap of some of the main highlights from the Techno Security and Forensics Investigations Conference (TSFIC) held in Myrtle Beach, South Carolina, from the 31st of May until the 3rd of June 2015.

The conference began at midday on Sunday 31st of May, with six main strands running throughout the duration of the event. Attendees received a colour-coded programme which allowed them to easily see which of the talks were part of the Audit, Forensics, Information Security, Investigations, Cellebrite Lab or Nuix Lab parts respectively.

The Information Security session by Chris Pogue was one of the talks that introduced the conference. Pogue discussed the recent spike in reported data breaches around the world, and questioned whether more data breaches had actually been happening in recent years, or whether the media were just reporting on them more frequently.

Read More
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (1330 reads)

Digital Forensics Poses Challenges for Texas Law Enforcement

Monday, June 22, 2015 (10:04:42)
At the South Austin, Texas, home of George De La Cruz, a one-story house with baby blue trim and a concrete porch lined with potted plants, investigators found no body. No physical proof Julie Ann Gonzalez was killed.

Prosecutors took him to trial anyway, and, in April, persuaded jurors De La Cruz had slain his estranged wife and used her cellphone to fool everyone into thinking she ran away. His conviction was hailed as a huge victory for authorities, who had no eyewitnesses, no confessions, no DNA tests, none of the evidence typical in most murders.

Read More (GovTech Magazine)
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (2083 reads)

New features in ReclaiMe Pro

Sunday, June 21, 2015 (18:27:18)
ReclaiMe Data Recovery Company announced that they added some forensic features to their ReclaiMe Pro software.

The new features, added to better serve digital investigators' needs, include

• file traces,
• calculating file hashes and searching by hashes,
• file content classifier.

The first feature, file traces, shows where a file data is physically located on a disk. Additionally, ReclaiMe Pro provides the source on-disk location for timestamps (creation, modification, and last access) for a file.

Search by file hashes allows sorting files against a ready-made or custom hash database.

Using file content classifier one can determine that a file content mismatches its extension.

All these features are available in evaluation version of ReclaiMe Pro.

For more information, please visit www.ReclaiMe-Pro.com.

SYN-CON Promises to be a Training Event Like No Other

Friday, June 19, 2015 (15:14:38)
Digital forensic examiners are confronted by many challenges today. More people are using the Cloud as a conduit for criminal activity and the countdown is on for the release of the Microsoft Windows 10 operating system. Examiners must be ready to adapt to these and many other changes in order to be successful at their jobs.

The new SYN-CON training conference will be held April 5-7, 2016 in Lake Mary, Florida. The conference centers on refreshing and renewing skills in sessions presented by industry leading instructors. All sessions are based on the latest research and techniques needed for examiners with breakthrough examination methods, as well as certification prep courses and exams.

This is a unique opportunity to experience the converging areas of cybersecurity, computer forensics, legal, and e-discovery all at one event.

Review - Learning iOS Forensics

Friday, June 19, 2015 (12:56:19)
Learning iOS Forensics is a practical textbook that aims to help digital forensics examiners of all levels to get to grips with the procedures involved in forensically analysing iOS devices.

The book opens with a preface, which describes how the various sections are set out and delineates the recommended audience. It explains that the book can either be read sequentially or used as a reference work in ongoing investigations. My own experience of reading the book would back this up – I read it from cover to cover and found it to be an excellent resource for iOS forensics, both as someone who has not yet come across an iOS device in an investigation, and as someone who is interested in digital forensics as a discipline.

Read More
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (1713 reads)

Learn About Digital Forensics in Law Enforcement – New White Paper from (ISC)2

Friday, June 19, 2015 (11:28:53)
Over the last decade, digital or cyber forensics has become a key part of criminal investigations, helping to solve or expedite cases that would have previously gone unsolved. The growing trail of digital evidence that investigators can tap is almost limitless, and the sources generating this data continue to evolve – from the Internet and mobile devices to vehicle sensors and wearable fashion. To support the processes and procedures required by law to successfully prosecute cases, digital forensics has grown into a scientific discipline and gained influence and credibility within the justice system.
  • Posted by: (ISC)2
  • Topic: News
  • Score: 0 / 5
  • (1967 reads)