±Forensic Focus Partners

Become an advertising partner

±Your Account


Nickname
Password


Forgotten password/username?


Membership:
New Today: 0
New Yesterday: 6
Overall: 28845
Visitors: 63

±Follow Forensic Focus

Join our LinkedIn group

Subscribe to news

Subscribe to forums

Identifying website visitors using phone battery life

Monday, August 03, 2015 (16:05:42)
A little-known feature of the HTML5 specification means that websites can find out how much battery power a visitor has left on their laptop or smartphone – and now, security researchers have warned that that information can be used to track browsers online.

The battery status API is currently supported in the Firefox, Opera and Chrome browsers, and was introduced by the World Wide Web Consortium (W3C, the organisation that oversees the development of the web’s standards) in 2012, with the aim of helping websites conserve users’ energy. Ideally, a website or web-app can notice when the visitor has little battery power left, and switch to a low-power mode by disabling extraneous features to eke out the most usage...

Read More (The Guardian)
  • Posted by: jamie
  • Topic: News
  • Score: 0 / 5
  • (1470 reads)

Announcing (ISC)²'s Security Congress 2015, Sept 28th-Oct 1st

Thursday, July 30, 2015 (07:17:00)
Digital Forensics will be a featured topic at (ISC)²'s Security Congress 2015, Sept. 28th-Oct. 1, in Anaheim, California. The conference offers four full days of educational sessions on a range of critical information security issues, including malware, cloud security, governance, regulation and compliance, mobile security, healthcare security, application security, digital forensics – and more. For those working in the digital forensics field, the conference provides an opportunity to network with other Certified Cyber Forensics Professionals (CCFPs), learn about the latest trends and technologies impacting digital forensics, and earn Continuing Professional Education (CPE) credits for your CCFP credential. For those interested in certification, there is no better place to learn about becoming a CCFP and engaging with leaders in the field. CCFP is the only global cyber forensics credential that provides a comprehensive validation of a candidate’s knowledge and skills as a digital forensics expert.

For more information and to register for Security Congress, click here.
  • Posted by: (ISC)2
  • Topic: News
  • Score: 0 / 5
  • (1370 reads)

Interview with Keith James, Executive Vice President of Sales, AccessData

Wednesday, July 29, 2015 (11:24:51)
Keith, please tell us about your role as EVP of Sales and Marketing at AccessData. What does your day-to-day work entail?

Customer service is my key priority. I spend a great portion of my day listening to customers, understanding their issues, and responding to their questions and concerns. My daily focus is on building better products, meeting and anticipating customer needs, and providing a better customer experience.

Your university degrees were in History and Law – what was it that made you interested in pursuing a career in digital forensics specifically?

History, Law and . . . digital forensics? I know -- at first glance they don’t seem to tie together – but the connection is that my intellectual passion is investigation. In college, I was fascinated with original source documents; not the dry textbooks, but documents written by people living in a given time and place.

Read More
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (1154 reads)

NAS Forensics Explained

Wednesday, July 29, 2015 (09:28:50)
Network Attached Storage (NAS) have a long track history of corporate deployments. Their scaled-down versions (ranging from single-bay to four-drive enclosures) are frequently used at homes and in offices. These smaller-size appliances are often called “personal clouds” for providing some parts of functionality of online cloud services.

More and more people prefer using their laptop computers at home instead of a full-size desktop. As many laptops are equipped with relatively small, non-expandable storage, NAS becomes an obvious and convenient way to increase available storage. In home environments, NAS storage are often used for keeping backups and/or storing large amounts of multimedia data such as videos, music and pictures, often including illicit materials. Due to the sheer size of these storage devices and their rapidly increasing popularity with home users, NAS forensics becomes increasingly important.

Read More
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (1448 reads)

Project Spartan Forensics

Monday, July 27, 2015 (13:26:01)
by James Gratchoff & Guido Kroon, University of Amsterdam

Project Spartan is the codename of the new Microsoft Edge browser and successor to its previous, Internet Explorer. This research paper gives insight into the current artefacts that the current development versions of Project Spartan leaves behind on workstations. The authors analysed what these artefacts are, where they are located and how can they be gathered. This research led to the conclusion that Project Spartan’s back end does not differ much from the latest Internet Explorer versions, as Project Spartan still uses similar ways to store data on the workstation it runs on. Furthermore, an open source tool has been developed to gather some of these artefacts in an automated way. The purpose of the tool is to gather the location of the artefacts not present in the database.

Read More
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (1765 reads)

FT Cyber Security Summit Europe – London 22nd September

Thursday, July 23, 2015 (11:17:36)
On the 22nd of September 2015, Forensic Focus will be attending the FT Cyber Security Summit in London. If there are any topics you’d specifically like us to cover, or any speakers you think we should interview, please let us know in the comments.

The second annual FT Cyber Security Summit Europe 2015 will bring together boardroom directors, chief executives, senior management and chief information security officers to discuss the current threats in cyberspace and what more should be done to build safer and more resilient businesses.

Chaired and moderated by senior FT journalists, the speakers and panellists will include a mix of corporate CISOs and senior officials from government departments responsible for helping public and private sector organisations manage their cyber risks.

Forensic Focus readers save 15% on the ticket price. Quote code FORF15 when registering online at http://live.ft.com/cybersecurity

Read More
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (1862 reads)

Webinar: Mobile Chat & Social App Forensics

Wednesday, July 22, 2015 (17:06:56)
Date: Thursday, July 23, 2015

Registration: http://www.magnetforensics.com/mobile-forensics/mobile-chat-social-app-forensics

Presenter: Tayfun Uzun, Product Manager at Magnet Forensics

Smartphone apps that allow users to express themselves by messaging, posting, tweeting, liking, commenting, and sharing images and videos, have radically altered communication patterns. This new world of hyper-connected mobile chat and social apps is evolving at warp speed, and it seems like a new app explodes in popularity every month, with others constantly changing and adding new features.

These apps are drastically altering the field of mobile forensics, creating new demands of digital forensics examiners who are expected to stay abreast of the latest app developments in order to recover and interpret data. The Magnet Forensics R&D team tracks the latest mobile app trends in order to develop the timely artifact updates that IEF mobile module users require.

Register now at http://www.magnetforensics.com/mobile-forensics/mobile-chat-social-app-forensics
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (2071 reads)

Evidence Acquisition and Analysis from Live Exchange

Tuesday, July 21, 2015 (10:37:58)
A great amount of legal and forensics discussion is involved when there is an investigation procedure that involves the seizing of crucial evidence from Live Exchange server. Whenever there is such an investigation, two things remain in focus

1. Identification of suspect evidence from the network
2. Collection approach that maintains exactitude of evidence

There has been an increasing effort in the theory of live imaging approaches because of the liabilities that come up when a server is taken down. In such a situation, the rules of law and evidence acquisition have caused new approaches and techniques of acquiring electronic evidence to be formed; many of these are specifically targeted at the large storage of data.

What are the data that are generally in question?

Read More
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (2398 reads)

Guidance Software, Inc. Introduces Tableau Password Recovery

Saturday, July 18, 2015 (09:29:47)
Guidance Software, Inc. is pleased to introduce Tableau Password Recovery, a powerful solution that accelerates dictionary-based and brute force password attacks to unlock protected files. By helping investigators access encrypted and locked files, the appliance expedites time-sensitive investigations and prevents them from becoming stalled or incomplete. The product was developed through a collaboration with leading vendors Passware and Digital Intelligence, Inc.

New Belkasoft Evidence Center 7.3 Enhances Data Carving and SQLite Analytics

Friday, July 17, 2015 (08:21:39)
Belkasoft updates Belkasoft Evidence Center, the company’s flagship digital forensic solution, to version 7.3. The new release comes with significant improvements to file carving and SQLite analysis algorithms as well as the search engine. With this update, Belkasoft Evidence Center enables investigators discover more evidence faster, while raising the bar of SQLite analysis to a whole new level. In addition, the product now supports Cellebrite Link Analysis integration, and offers numerous other enhancements.