±Partners and Sponsors

±Your Account


Nickname
Password


Forgotten password/username?


Membership:
New Today: 2
New Yesterday: 5
Overall: 26229
Visitors: 77

±Forensics Europe Expo


±Follow Forensic Focus

Join our LinkedIn group

Subscribe to news

Subscribe to forums

Subscribe to blog

Subscribe to tweets

Digital Forensics, Computer Forensics, eDiscovery

Search on This Topic: Links

[ Go to Home | Select a New Topic ]

Is Your Computer Forensics Investigation A Symphony Or A Circus?

Friday, December 13, 2013 (11:39:01)
Digital forensics is changing, and you should be prepared for more of it in the future, not less. The increase of cloud computing has, in some ways, reduced the instances of hard drive analyses, but the explosion in mobile devices has more than offset the need for device-level analysis for litigation and investigations. In fact, due to the wide variety of mobile devices, the myriad ways of configuring them, and the new types of data created and stored, there is an explosion in the need for qualified digital forensics. Even if you have not needed digital forensics in the past, it is increasingly likely you will in the future.

Dealing with computer forensics can be daunting, but understanding the roles of corporate counsel, outside counsel and the forensics team, and understanding best practices for a forensics investigation, can make the difference between an effective investigation and digital disaster...

Read More (The Metropolitan Corporate Counsel)
  • Posted by: jamie
  • Topic: Links
  • Score: 0 / 5
  • (1990 reads)

Investigating iOS Phone Images, File Dumps and Backups

Wednesday, July 31, 2013 (15:28:50)
As of January 2013, Apple announced it had sold over 500 million iOS devices. While iOS seems to be the leading operating system for tablets worldwide, Android continues to be the leading operating system for mobile phones worldwide.

Regardless of the statistics, if you are an active forensic examiner, chances are very high you will need to conduct an examination of an iOS mobile device (if you haven’t several times already). This article will discuss some of the steps involved and areas of interest when conducting an analysis of an iOS device for Internet related activity...

Read More (Magnet Forensics)

Exchange 2013 Enhanced Email Retention, Archiving, Legal Hold, and eDiscovery

Monday, November 26, 2012 (14:29:45)
In this day and age, email is more than just messages, calendars, and contacts for organizations, they also need the ability to address legal requirements around message retention (both keeping content or automatically deleting content by policy) along with the ability to do eDiscovery search of content throughout the enterprise as well as put content on Legal Hold. While much of this was included in Exchange 2010, what Microsoft did for Exchange 2013 (and the corresponding SharePoint 2013, Lync 2013, and Office Web Apps) greatly enhances an organizations ability to perform required tasks...

More (Network World)
  • Posted by: jamie
  • Topic: Links
  • Score: 0 / 5
  • (1343 reads)

How to report a computer crime: SQL injection website attack

Monday, November 19, 2012 (18:46:48)
In this article, we'll look at an SQL injection attack. We'll look at what offences are committed in different countries when a crime like this happens, how you should report the crime, and what evidence you can preserve. Take this scenario:

A company has a web server and associated database configured to serve dynamic content. The company has set up its website insecurely, leaving it vulnerable to input validation attacks. A cybercriminal has been hired by a competitor of the company to "take the company offline”. The cybercriminal has identified that the company website is susceptible to SQL injection, so performs a series of SQL injection attacks. This results in the deletion of a number of tables from the database, rendering the company website inoperable...

More (Naked Security)
  • Posted by: jamie
  • Topic: Links
  • Score: 0 / 5
  • (1592 reads)

How to report a computer crime: Unauthorised email account access

Wednesday, October 31, 2012 (13:19:55)
Do you know how to report a computer crime? Or even who you would report it to? Well, there is no one size fits all solution - it depends on the individual circumstances and where you are in the world - but we've drawn up some scenarios that are typical of some of the crimes that any computer user, at home or work, might come across. In the first of our series of articles on how to report a computer crime, we'll look at unauthorised email access, what offences are committed when a crime like this happens and how you should report it...

More (Naked Security)
  • Posted by: jamie
  • Topic: Links
  • Score: 0 / 5
  • (1561 reads)