±Forensic Focus Partners

Become an advertising partner

±Your Account


Username
Password

Forgotten password/username?

Site Members:

New Today: 0 Overall: 31707
New Yesterday: 3 Visitors: 81

±Follow Forensic Focus

Forensic Focus Facebook PageForensic Focus on TwitterForensic Focus LinkedIn GroupForensic Focus YouTube Channel

RSS feeds: News   Forums   Articles

±Latest Articles

RSS Feed Widget

±Latest Webinars

Digital Forensics, Computer Forensics, eDiscovery

Bridging The Gap Between Mobile And Computer Forensics (Webinar)

Friday, February 10, 2017 (17:44:38)
In this webinar, we will look at the trends and challenges in acquiring and analysis mobile devices. We will also discuss the techniques and workflows for optimising investigations that include mobile devices, computers, and cloud-based evidence.
Register now!

Registration For The Magnet User Summit // 2017 Series Is Now Open

Friday, February 10, 2017 (14:20:28)
You can now register for the Magnet User Summit 2017 Series.

In May, the team is heading to London and Las Vegas to bring our customers all the latest news, product features, hands-on learning, and our take on industry issues.

Interview With Victor Limongelli, Chairman & Chief Executive Officer, AccessData

Wednesday, February 08, 2017 (18:47:21)
Congratulations on being named CEO of AccessData. You previously served as President and CEO of Guidance. Why AccessData? Why now?

I’ve been in the industry since 2003, I’ve known – and competed against – AccessData for many years, and I long viewed FTK as one of the key products in forensics. After becoming Chairman in 2015, I had an opportunity to see the company up close, and when I was asked to take over as CEO I was very comfortable in the strength of the product set, the dedication of the employees worldwide, and the opportunity to grow the business. In particular, the AD Lab product struck me as the future of forensics, enabling scalability and collaboration that is not possible with the traditional, stand-alone forensics approach. That is a big focus of AccessData in 2017.

Read More
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (769 reads)

Google's new AI system unscrambles pixelated faces

Wednesday, February 08, 2017 (12:26:12)
Google’s neural networks have achieved the dream of CSI viewers everywhere: the company has revealed a new AI system capable of “enhancing” an eight-pixel square image, increasing the resolution 16-fold and effectively restoring lost data.

The neural network could be used to increase the resolution of blurred or pixelated faces, in a way previously thought impossible; a similar system was demonstrated for enhancing images of bedrooms, again creating a 32x32 pixel image from an 8x8 one.

More (Guardian)
  • Posted by: jamie
  • Topic: News
  • Score: 0 / 5
  • (1220 reads)

Samsung sBrowser – Android Forensics: A Look Into The Cache Files

Monday, February 06, 2017 (19:49:53)
by Robert Craig and Michael Lambert

Samsung devices are a large portion of the Android OS market. Samsung has its own Internet Browser, “sbrowser”, installed onto their devices. All web browsers leave artifacts from user activity. The “sbrowser” cache files were similar to other browsers. An embedded source URL gave insight where the cached image came from. Looking at Internet History, cookies, and the cache file itself, an investigator can gain insight where the cached image came from and the likely web page it came from.

Read More
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (1562 reads)

Unlocking The Screen Of An LG Android Smartphone With AT Modem Commands

Friday, February 03, 2017 (15:38:41)
by Oleg Davydov, CTO, Oxygen Forensics

Modern smartphones are much more than just a device for voice calls. Now they contain a lot of personal data – contact list, communication history, photos, videos, Geo tags etc. Most smartphones can also work as a modem.

Almost every modem is Hayes-compatible which means it supports commands of the AT language developed in 1977 by Hayes. Every model supports some basic set of commands which is defined by the manufacturer. Sometimes this set can be extended and can contain very interesting commands.

Let us study behavior of an LG smartphone. When you connect it to the computer by USB you get access to the modem automatically (pic. 1). What is peculiar for LG is that the modem is available even if the phone’s screen is locked.

Read More
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (1795 reads)

Using Keywords With Magnet AXIOM

Wednesday, February 01, 2017 (13:40:17)
Keywords are an essential part of many forensic examinations. While running keyword lists shouldn’t be the extent of an investigation, the right keyword list can help examiners quickly get to the relevant evidence for their case.

Magnet AXIOM allows examiners to run several different keyword searches either before or after processing your case. Let’s take a look at some of the options available.

Review Of Windows OS Training From AccessData

Friday, January 27, 2017 (16:38:58)
Reviewed by Scar de Courcier, Forensic Focus

From the 6th-8th of December 2016, AccessData ran a Windows course in a training centre overlooking Trafalgar Square in London, UK. The aim of the course was to familiarise forensic investigators with the Windows operating system and give an in-depth understanding of its potential for analysis in digital forensic investigations.

The course was open to all levels, from those who had never conducted an investigation to those who were more familiar with digital forensic techniques. Some level of familiarity with AccessData’s products was assumed, although everything was explained in great detail throughout the course, making it accessible for those who were just starting out as well.

Read More
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (1805 reads)

This Month In Forensics

Thursday, January 26, 2017 (19:26:46)
Curated by Phill Moore

Russ McRee updated the Incident Response Hierarchy of Needs to a DFIR Hierarchy of Needs & Critical Security Controls.

Oxygen Forensic Detective released version 9.1.1.

Joshua James demonstrated how to compile The Sleuth Kit in Linux.

Lee Reiber discussed the logs.db file in Samsung Android devices.

Jonathon Poling talked about why it's so important to understand your tools.
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (1307 reads)

Forensic Focus Forum Round-Up

Wednesday, January 25, 2017 (16:30:02)
Welcome to this month’s round-up of recent posts to the Forensic Focus forums.

What remnants does Word leave on the local disk?

Have you done any research on how to reconstruct history from Google Chrome? Chime in on the forum.

Forum members discuss the difference between invasive and pervasive encryption.

Can you help this student with a project about smartwatch forensics?

Join the heated discussion about backdoors in encrypted chat apps.

Forum members discuss how to locate an iPhone that is in a river.
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (2280 reads)