±Forensic Focus Partners

±Your Account


Nickname
Password


Forgotten password/username?


Membership:
New Today: 1
New Yesterday: 13
Overall: 27851
Visitors: 75

±Forensic Focus Partner Ads

Join our LinkedIn group

Subscribe to news

Subscribe to forums

Subscribe to blog

Subscribe to tweets

Page 3

Search on This Topic: News

[ Go to Home | Select a New Topic ]

FTK 5.6 Software Release

Friday, December 12, 2014 (15:48:04)
AccessData's Forensic Toolkit 5.6 software upgrade is now available.

Improvements:

- System Information tab allows you to view system information that contains detailed information about disk images in an easy to read format.
- Entity Extraction processing options to identify and extract specific types of data in your evidence such as credit card numbers, phone numbers and social security numbers
- Exchange 2013 Support
- KFF improvements
- IPv6 support
- and more

Download Release Notes (pdf)
Download Software Upgrade

Analyzing Windows Phone Artifacts with IEF

Wednesday, December 10, 2014 (13:30:29)
New with Internet Evidence Finder (IEF) v6.5, Magnet Forensics has added support for a number of native and third-party apps for Windows Phone. Using JTAG and Chip-off techniques, forensics examiners can use IEF to recover call logs, SMS/MMS, emails, and contacts.

One of the major challenges for Windows Phone analysis is the acquisition phase. Unlike other devices, such as iOS and Android, JTAG and Chip-off acquisitions are the only methods to acquire most Windows Phones. This means that your traditional forensic acquisition tools such as Cellebrite, XRY, MPE+, etc., cannot acquire the data from a Windows Phone...

Read More (Magnet Forensics)

How NIST is helping law enforcement with digital forensics

Wednesday, December 10, 2014 (09:13:15)
“Digital forensics is at a time of crisis and a time of opportunity.”

This remark from Eoghan Casey, lead cybersecurity engineer at the MITRE Corp., highlighted the overarching themes presented at the first day of the National Institute of Standards and Technology forensics conference Wednesday.

Throughout the morning, a number of NIST scientists, engineers and program managers poured over the ways the agency is helping law enforcement enhance investigations tied to recovering data from digital devices or improving the accuracy of biometrics...

Read More (fedscoop)
  • Posted by: jamie
  • Topic: News
  • Score: 0 / 5
  • (2179 reads)

Oxygen Forensics releases the new and free Oxygen Forensic Viewer

Tuesday, December 09, 2014 (11:10:42)
Oxygen Forensics releases Oxygen Forensic Viewer, a stand-alone tool for viewing and sharing information collected with Oxygen Forensic Suite. Fast, easy and lightweight, Oxygen Forensic Viewer allows accessing the complete set of evidence, analyzing deleted data, examining suspects’ communications and locating all types of evidence with built-in search. While the tool is available to licensed users of Oxygen Forensic Suite, the Suite itself is not required for installing and using Oxygen Forensic Viewer.

Effectively, Oxygen Forensic Viewer is a perfect tool for sharing information with colleagues and coworkers, enabling easy access to evidence collected with Oxygen Forensic Suite without additional costs and learning curve.

Webinar: Investigating Sexual Crimes in the Tinder Age

Thursday, December 04, 2014 (12:19:14)
Date/Time: Tuesday December 16th, 2014 @ 10:00 am EST (3pm GMT)

The usage of location-based mobile dating applications like Tinder and Grindr has exploded over the last year. This new class of mobile app allows singles to identify, chat with, and meet other singles located in their immediate vicinity. As the popularity of these apps continues to grow, they will become increasingly important sources of evidence for digital forensics examiners.

On Tuesday December 16th, join Jad Saliba and Jamie McQuaid from Magnet Forensics as they explore what you need to know about finding and analyzing evidence from this new class of mobile dating application using a real-world case scenario...

REGISTER TODAY HERE
  • Posted by: jamie
  • Topic: News
  • Score: 0 / 5
  • (1912 reads)

IIF – an evidence extraction model for investigation

Wednesday, December 03, 2014 (14:35:49)
This framework was first introduced in DFRWS EU 2014 (the first DFRWS conference in Europe) at Amsterdam held in May and later presented at Hacks in Taiwan 2014 (HITCON) which is a high-tech security conference in Taiwan held in August.

Abstract

Digital forensics investigators are facing new challenges every day because there are a large variety of high-tech cybercrimes reported. For instance APT, Hacking, Ransomware and DDOS etc… During investigation, investigators are often too concentrated on the evidence itself, like reversing the malware for the detailed behaviors or analyzing packets for credential leakage, but seldom or having difficulties to draw out the whole picture of the incident by correlating the seized / acquired evidences for the intelligence purpose. All relevant data from seized media should be utilized and analyzed, later transformed to intelligence so as to build a profile of the potential suspect with the corresponding attributes...

Read More
  • Posted by: jamie
  • Topic: News
  • Score: 0 / 5
  • (1110 reads)

Magnet Forensics IEF Essentials Training Review

Thursday, November 27, 2014 (10:09:40)
On the 14th-17th of October 2014, Magnet Forensics ran its first remote training course on the essential knowledge required to properly use Internet Evidence Finder, Magnet's flagship software solution.

The course was set up with the aim of aiding digital forensics investigators who are completely new to IEF, or investigators who are not used to working with digital forensics solutions but require their use on certain cases.

Rob Maddox, Magnet's Director of Global Training, put the course together and described how it was developed:

“We designed the 3-day IEF Essentials course for new and experienced digital forensics professionals who are incorporating Internet Evidence Finder (IEF) into their investigative workflows...

Read More
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (1672 reads)

Rob Maddox, Director of Global Training, Magnet Forensics

Tuesday, November 25, 2014 (14:02:43)
Rob, please tell us about your role as Director of Global Training at Magnet Forensics.

My role as the Director of Global Training for Magnet Forensics encompasses several unique yet interconnected responsibilities, which include training development and delivery; business development; de facto sales and marketing representation; and product development.

First and foremost, I have been responsible for developing the new 3-day IEF Essentials course. I basically spent the first two months in my new position locked in my office, surviving on energy drinks and microwave meals, while working on the new curriculum. Once I had the “beta” version ready, I delivered this to a select group of subject matter experts (SMEs) from the digital forensics community, and used their feedback to further revise the course into its current format and content. Once I felt the course was ready, I began delivering the new 3-day IEF Essentials class internationally in October...

Read More
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (1205 reads)

Magnet Forensics Releases Internet Evidence Finder v6.5

Tuesday, November 25, 2014 (10:24:21)
With the release of Internet Evidence Finder v6.5, Magnet Forensics adds support for Windows Phone, and introduces new triage features including live system artifact recovery capabilities.

IEF is already capable of recovering evidence from native and third-party mobile applications found on Android and iOS smartphones. With IEF v6.5, investigators can now analyze a physical image of a Windows Phone acquired using JTAG and chip-off techniques.

Now available as an optional module, Triage capabilities can be added-on to any license, giving an examiner the flexibility to bring their dongle into the field to conduct live system forensics. Capture live RAM, collect data from live system artifacts, and run an IEF search to recover hundreds of different types of digital forensics artifacts from Windows powered computers...

Read More (Magnet Forensics)

Proposed UK law aims to identify suspects by IP address

Monday, November 24, 2014 (13:35:35)
A law forcing firms to hand details to police identifying who was using a computer or mobile phone at a given time is to be outlined by Theresa May.

The home secretary said the measure would improve national security.

As part of the Counter-Terrorism and Security Bill, providers would have to retain data linking devices to users.

But campaigners warned it could see the revival of the so-called "snoopers' charter" - a previous attempt to bring in wide-ranging web monitoring powers...

Read More (BBC)
  • Posted by: jamie
  • Topic: News
  • Score: 0 / 5
  • (1466 reads)