±Forensic Focus Partners

Become an advertising partner

±Your Account


Nickname
Password


Forgotten password/username?


Membership:
New Today: 0
New Yesterday: 3
Overall: 28481
Visitors: 75

±Follow Forensic Focus

Join our LinkedIn group

Subscribe to news

Subscribe to forums

Page 3

Search on This Topic: News

[ Go to Home | Select a New Topic ]

Nominate Your Peers! Secure View Gives Back

Wednesday, April 29, 2015 (09:51:27)
In honor of Thursday's release of Secure View 4, Susteen will be donating Four free Secure View kits to Law Enforcement agencies in need. Secure View Advanced Mobile Forensic software can acquire data from thousands of phones with industry leading analytics. Although Susteen pioneered mobile forensics and has been around for over 20 years, many do not know that Susteen stands for "Success for Teens."

First Ever Advanced Cross Case Analytics (ACCE) released with Secure View 4

Tuesday, April 28, 2015 (08:18:31)
First Ever Advanced Cross Case Analytics (ACCE) for mobile forensics will debut with Secure View 4!

Irvine, Ca. 4/27/2015

With the launch of Secure View 4 this Thursday, April 30th, 2015 new and current users will have access to the first ever ACCE analytics for mobile forensics called SV Detect. This breakthrough will allow users to increase conviction rates and build new evidence against past crimes. SV Detect will allow Secure View users to run newly acquired data against their old reports. This fantastic feature allows a user to run newly acquired contacts and text messages through old cases to match up data. This tool is a feature that can be turned on or off at your discretion. SV Detect is just one of the new features to be launched with Secure View 4.

ReclaiMe Introduces BTRFS Recovery

Monday, April 27, 2015 (13:25:32)
ReclaiMe – the only data recovery vendor providing BTRFS recovery

BTRFS is a filesystem from Linux which has several distinctive features such as copy-on-write, checksumming, data scrubbing, and more.

ReclaiMe Data Recovery Company integrated a new data recovery algorithm using which you can recover data from a failed BTRFS volume in their data recovery software - ReclaiMe Pro.

Webinar: Policing the digital crimes of today

Friday, April 24, 2015 (11:59:17)
Date/Time: Tuesday 5th May, 4pm BST/11am EDT

Speakers: Paul Slater, Director of Forensic Solutions EMEA at Nuix and Troy Bettencourt, Sales Engineer NA at Nuix

Investigators who are working with legacy digital forensic tools and faced with shrinking budgets often find it hard to see how they can keep up. Join this webinar to find out how you can work smarter, not harder, during a forensic investigation. Learn how to simplify, streamline and automate your workflows, analytics and review processes to help you deal with growing volumes of digital evidence and shrinking budgets.

We'll show you how you can process more files and formats, integrate your workflows, and work collaboratively with technical investigators and subject matter experts to quickly get to the essence of the evidence.

Register now at http://info.nuix.com/policing-digital-crimes-of-today-FF.html
  • Posted by: jamie
  • Topic: News
  • Score: 0 / 5
  • (1412 reads)

Forensic Focus Forum Round-Up

Friday, April 24, 2015 (08:51:54)
Welcome to this round-up of recent posts to the Forensic Focus forums.

How would you acquire data from a password protected MS Surface Pro?

Forum members discuss malware risk mitigation on forensic workstations.

How can a split E01 image of a Windows 7 Enterprise SP1 physical disk protected by BitLocker be mounted? Forum members come up with a solution.

Minime2k9 asks how to find evidence of remote desktop login outside of the Windows Security log.

Should you keep a chain of custody for forensic investigations in corporate environments? Add your thoughts on the forum.

Forum members discuss a timestamp discrepancy on an acquired Linux machine.

How do you recover deleted Snapchat images on an iPhone 4S? Chime in on the forum.

Forum member liguoroa gives feedback on BlessHex editor.
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (1793 reads)

Interview with Bruno Kerouanton, CISO of the Republic and Canton of Jura

Thursday, April 23, 2015 (10:28:53)
Bruno, you're CISO of the Republic and Canton of Jura in Switzerland. Could you tell us a bit about your job and what a typical day involves?

Sure. As Chief Security Officer for cybersecurity I'm involved in ensuring security of the state. That means we have mostly 400 locations for different applications, for example schools, healthcare industry, roads, taxes, police and so on. So the perimeter I have to secure is quite broad. The problem we have is that I have to check all the risks involving this perimeter and also understand the needs of the business, because every business has different needs. So we have to match guidelines also from the Swiss contribution, and ISO 27001 standards, to define policies and roles. So that's my main job and that takes a lot of time because we have to be compliant.

Read More
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (1815 reads)

Head replacement tools for "landing zone" HDDs

Wednesday, April 22, 2015 (16:27:57)
Very important part of HDD functioning is a principle of heads parking while device is turned off. During the decades of HDD development, numerous improvements in this area were seen. These changes positively affected data security, capacity, product lifetime and decreased device dimensions.

When hard drive is turned off, its sensitive heads must be parked at a "safe place". This safe area, must be designed in such way, that read/write heads can't be damaged and that valuable data is not threatened in any way.

Taking Down Fraud Sites is Whac-a-Mole

Monday, April 20, 2015 (16:37:48)
I’ve been doing quite a bit of public speaking lately — usually about cybercrime and underground activity — and there’s one question that nearly always comes from the audience: “Why are these fraud Web sites allowed to operate, and not simply taken down?” This post is intended to serve as the go-to spot for answering that question.

Q: Why not take down the hundreds of sites now selling stolen credit cards and identity data?

For starters, it’s not always so easy to take these sites offline. Many of them rely on domain name registrars that routinely ignore abuse requests. The same goes for the organizations hosting a number of these unsavory markets.

Read More (KrebsOnSecurity)
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (2056 reads)

Expert-Level (ISC)2 CCFP Digital Forensics Training Available from May-July

Friday, April 17, 2015 (14:55:45)
From May 11-July 1, 2015, (ISC)2 is delivering Live OnLine Training courses to provide expert-level instruction for those interested in attaining CCFP certification (Certified Cyber Forensics Professional).

The courses are delivered through the (ISC)2 Learning Center, a centralized platform that allows learners to access CCFP training materials, educational resources and manage their (ISC)2 online training in one environment.
  • Posted by: (ISC)2
  • Topic: News
  • Score: 0 / 5
  • (3448 reads)

Interview with Matt Davies, Digital Forensics Analyst, Sytech

Friday, April 17, 2015 (11:57:48)
Matt, you're a digital forensics analyst at Sytech. Tell us a bit about your role and what it involves.

My role at Sytech predominantly involves the extraction and analysis of embedded devices, such as mobile phones, tablets, satellite navigation systems, games consoles, unknown devices etc. The examinations I am involved in vary considerably and range from indecent images of children (IIOC) to providing assistance in murder investigations. Working for a private organisation, such as Sytech, allows me to experience both prosecution and defence based cases.

What first made you interested in digital forensics as a field?

It was the varied nature of the work accompanied by the opportunity to make a difference that attracted me to the field of Digital Forensics.

Read More
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (2981 reads)