±Partners and Sponsors

±Your Account


Nickname
Password


Forgotten password/username?


Membership:
New Today: 11
New Yesterday: 4
Overall: 26771
Visitors: 49

±Follow Forensic Focus

Join our LinkedIn group

Subscribe to news

Subscribe to forums

Subscribe to blog

Subscribe to tweets

Forensic Focus Forum Round-Up

Friday, July 18, 2014 (15:10:05)
Welcome to this round-up of recent posts to the Forensic Focus forums.

Forum members discuss the best way to retrieve Facebook profile data.

What does it mean when a mail header shows two X-Originating IP addresses?

Forensic imaging of a USB with a corrupt file system.

Forum members discuss how to find an XLS file on a computer that has been reformatted.

Unexpected SQLite field data in WhatsApp databases provokes discussion on the forum.

Forum members discuss how to process several thousand images on a hard drive.

Do you have any recommendations for mobile forensic tools? Add yours in the forum.

What is the most effective way to extract data from a Nokia Lumia 520?

Dark net 'used by tens of thousands of paedophiles'

Wednesday, July 16, 2014 (13:29:16)
Tens of thousands of paedophiles are using the so-called dark net to trade images of sexual abuse, an investigation by BBC News indicates.

One site receives as many as 500 page views per second, its founder says.

Figures from another site suggest Brits are heavily involved in producing and distributing illegal obscene images.

Britain's National Crime Agency warned in its 2014 threat assessment that abusers were turning to anonymous sites and encryption technology...

Read More (BBC)
  • Posted by: jamie
  • Topic: News
  • Score: 0 / 5
  • (1180 reads)

Finding and Analyzing Document Files with IEF

Tuesday, July 15, 2014 (14:29:24)
Analyzing documents to prove their authenticity has been one of the cornerstones of computer forensics and is still an important part of the investigative process to this day. Whether you’re investigating documents in a fraud case, an IP theft, or from a malware/phishing intrusion, proper document analysis is essential to help uncover the truth in many investigations.

New to Internet Evidence Finder v6.4 is the ability to recover and analyze documents found on a suspect’s PC. Available with the OS & Business Apps module, IEF is now able to recover Microsoft Office documents including Excel, PowerPoint, Word and PDF documents...

Read More (Magnet Forensics)

Approximate Matching Helps Digital Forensics Find Similar Artifacts Among Data

Tuesday, July 15, 2014 (13:28:06)
According to the National Institute of Standards and Technology (NIST), approximate matching is a technology that can be used in a variety of settings, including digital forensics, security monitoring and data filtering. It involves locating similarities among pieces of digital data to match objects that are alike or to find objects that contain other objects. Such technology will likely become invaluable in upcoming years as the amount of information collected and used becomes even more overwhelming...

Read More (ITBusinessEdge)
  • Posted by: jamie
  • Topic: News
  • Score: 0 / 5
  • (729 reads)

Job Vacancies: Various Digital Forensics Posts (Blackthorn, London)

Monday, July 14, 2014 (14:41:25)
Due to continued growth and expansion Blackthorn are looking to recruit to a number of digital forensic positions in London.

We are particularly looking for the following:

Computer Analysts (3 years plus experience)
Computer Analysts (1-2 years experience)
Mobile Device Specialists (1 year plus experience)
Experienced Cell Site Specialists

We would also like to hear from you if you have skills in areas such as Incident Response and Network Forensics. Ideally you will have experience of law enforcement and corporate work but candidates will be considered if they have experience in either...

Read More