±Forensic Focus Partners

±Your Account


Forgotten password/username?

New Today: 2
New Yesterday: 5
Overall: 28190
Visitors: 43

±Forensic Focus Partner Links

Join our LinkedIn group

Subscribe to news

Subscribe to forums

Page 3

Search on This Topic: News

[ Go to Home | Select a New Topic ]

Job Vacancy: Snr. Computer Forensic Analyst, Oxfordshire, UK

Monday, February 16, 2015 (10:59:43)
This is an exciting opportunity for a Senior Computer Forensic Analyst / Digital Forensic Analyst to join our fantastic new Digital Forensics Team. The successful candidate will report to the Digital Forensics Manager, and will be responsible for managing and delivering their individually assigned cases for forensic analysis of computer equipment and mobile devices.

* Carry out digital forensic examinations of electronic mobile devices.
* Work methodically using the processes and documentation.
* Follow the strict quality procedures but be willing to propose ideas for continuous improvement.
* Share knowledge and assist with in-house training for the benefit of the team and the business.
* Secure and preserve digital evidence within the laboratory and within clients’ premises.
* Use various tools and techniques to analyse and investigate evidence.
* Provide rapid, clear, verbal and written reports, often for use in the Criminal Justice System.

Read More
  • Posted by: jamie
  • Topic: News
  • Score: 0 / 5
  • (946 reads)

Computer Forensics Critical in the Trial of Silk Road’s Ross Ulbricht

Friday, February 13, 2015 (12:21:22)
The ongoing trial of Silk Road creator Ross Ulbricht (a.k.a. Dread Pirate Roberts, or DPR) is not only fascinating, but it will have tremendous implications for criminals in the future. With close to a million registered users on the Silk Road and approximately $1.3 billion in transactions, the government had no choice but to prosecute the creator and alleged chief executive – Ross Ulbricht.

The Tor network Ulbricht used for years has been notorious for shielding the identities of some of the world’s most unsavory characters – trading in child abuse images, dealing narcotics, proffering stolen credit card numbers, pedaling guns and ammunition and many other illicit activities. If the government proves their case and successfully convicts Ulbricht, it will send shockwaves through the Dark Net community of criminal actors...

Read More (HSToday.us)
  • Posted by: jamie
  • Topic: News
  • Score: 0 / 5
  • (1365 reads)

"Test Drive" AccessData Products for FREE!

Wednesday, February 11, 2015 (18:11:57)
Available now:

Evaluate any available AccessData solution for 20 days, full product capabilities, no license, no dongle and no credit card required.

Click here to start your test drive today!

UK Home Office Report: eDiscovery in Digital Forensic Investigations

Wednesday, February 11, 2015 (13:52:25)
Nuix, a technology company that enables people to make fact-based decisions from unstructured data, welcomes the findings of the report ‘eDiscovery in Digital Forensic Investigations’ published by the United Kingdom Home Office. The report concludes that “Giving investigators rapid access to the digital information in a form that they can understand and work with has the potential to significantly enhance an investigation.”

The report details the results of a review of the use of eDiscovery software and workflows in the context of digital forensic investigation, conducted by the London Metropolitan Police Service and the UK Centre for Applied Science and Technology.

New CCFP Snapshot Describes What it Takes to Be a Certified Cyber Forensics Pro

Monday, February 09, 2015 (13:43:08)
The CCFP Snapshot offers an inside look at what it’s like to be a Certified Cyber Forensics Professional (CCFP). Offered by (ISC)2®, the global leader in information security certifications, CCFP is the only global cyber forensics credential that provides a comprehensive validation of a candidate’s knowledge and skills as a digital forensics expert.

Today’s digital forensics professionals need to understand far more than just hard drive and intrusion analysis. Whether a law enforcement officer supporting criminal investigations, a digital forensics specialist consulting clients, or an eDiscovery specialist working on litigation, CCFP demonstrates a professional’s ability to gather, analyze, and deliver digital evidence that is accurate, complete, and reliable.
  • Posted by: (ISC)2
  • Topic: News
  • Score: 0 / 5
  • (2451 reads)

Acquiring Memory with Magnet RAM Capture

Thursday, February 05, 2015 (17:40:11)
Recently, we released a new free tool that allows investigators to acquire the memory of a live PC. Customers using our IEF Triage module will already be familiar with this tool, as it’s used to acquire evidence from live systems. In realizing that others could benefit from our RAM capture tool, we decided to release it free to the forensics community.

Memory analysis can reveal a lot of important information about a system and its users. There are often instances where evidence stored in memory is never written to the hard drive, and may only be found in the pagefile.sys or hiberfil.sys. Memory analysis is essential to many malware and intrusion incidents and can be imperative in recovering valuable evidence for almost any PC investigation...

Read More (Magnet Forensics)

Review: IEF Mobile Module

Tuesday, February 03, 2015 (11:57:16)
Reviewed by John J. Carney, Carney Forensics

I am a digital forensics examiner who early in my career studied computer science and wrote code as a software developer and later in my career studied law and became a licensed attorney. I have acquired certifications in both mobile device forensics and computer forensics and own a private digital forensics firm in Minnesota. We love mobile! Half our case load is recovering dozens of flavors of deleted messages from every variety of phone known to humanity. But we also devise evidence strategy for complex civil litigation and draft preservation letters and requests for production and advise on e-discovery issues, which now increasingly turn on mobile evidence.

I obtained Magnet Forensics’ Internet Evidence Finder (IEF) in early January 2013 upon strong recommendations from friends in the industry. As a mobile examiner I procured it for examining microSD cards removed from the phone and placed behind a write blocker for live and deleted multimedia evidence including photo, video, audio, and anything else that might be there...

Read More
  • Posted by: jamie
  • Topic: News
  • Score: 0 / 5
  • (1022 reads)

How Secure Is Your Password?

Sunday, February 01, 2015 (11:33:55)
How many passwords does an average Joe or Jane have to remember? Obviously, it’s not just one or two. Security requirements vary among online services, accounts and applications, allowing (or disallowing) certain passwords. Seven years ago, Microsoft determined in a study that an average user had 6.5 Web passwords, each of which is shared across about four different websites. They’ve also determined that, back then, each user had about 25 accounts that required passwords, and typed an average of 8 passwords per day.

It didn’t change much in 2012. Another study determined that an average person has 26 online accounts, but uses only five passwords to keep them secure, typing about 10 passwords per day. CSID has a decent report (opens as PDF) on password usage among American consumers, discovering that as many as 54% of consumers have five passwords or fewer, while another 28% reported using 6 to 10 passwords...

Read More
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (1227 reads)

Atola Insight Forensic 4.2: Image Files on Target Media, Improved Performance

Friday, January 30, 2015 (16:59:09)
Atola Technology has announced a major update to Insight Forensic. All existing customers can freely download and install the new 4.2 software.

Having been asked many times by forensic experts to allow the creation of image files on target devices attached directly to an Atola DiskSense unit, this facility is now available.

Forensics and Bitcoin

Friday, January 30, 2015 (14:36:49)
This article does not attempt to provide a beginners guide to Bitcoin, nor an in-depth thesis on Bitcoin forensics. Rather, it will be an overview of the potential opportunities available to digital forensics and traditional investigators to obtain evidence in relation to attributing transactions or holdings to a specific person and (legally) seizing those funds.

I will discuss academic work that has been undertaken in this area, what precautions a security aware user may take and the issues introduced by them doing so. I will also discuss an open-source Python tool called BTCscan, which has been created to accompany this article and will carve out bitcoin addresses, private keys and other Bitcoin artifacts.

This article may be of interest to persons conducting investigations for criminal, civil, personal or business reasons. Some elements may be of limited relevance to agencies without powers of seizure and/or subpoena...

Read More
  • Posted by: jamie
  • Topic: News
  • Score: 0 / 5
  • (1083 reads)