±Forensic Focus Partners

Become an advertising partner

±Your Account


Username
Password

Forgotten password/username?

Site Members:

New Today: 1 Overall: 34614
New Yesterday: 3 Visitors: 242

±Follow Forensic Focus

Forensic Focus Facebook PageForensic Focus on TwitterForensic Focus LinkedIn GroupForensic Focus YouTube Channel

RSS feeds: News Forums Articles

±Latest Articles

±Latest Webinars

Page 3

The New Griffeye AI Technology – Trained at Taskforce Argos

Thursday, September 27, 2018 (12:13:15)
These days computers can use high-performance AI technology to optimize energy grids for entire cities, provide accurate sports analysis, create movie trailers, detect the spread of cancer and so on – the areas where it can be used are almost endless. At Griffeye, our AI technology detects child sexual abuse content in massive image and video datasets. Here’s how we trained it.

Digital Forensics News September 2018

Thursday, September 27, 2018 (09:25:52)
Magnet Forensics have released the latest version of AXIOM.

Susteen's new Data Pilot 10 Field Acquisition Device allows investigators to acquire mobile data more quickly.

Paraben have released a free ebook about validation in digital forensics.

BlackBag have released BlackLight 2018 R3, which includes APFS snapshot capabilities and increased support for GrayKey images.

AccessData will now be providing training to European law enforcement agencies.

The call for speakers for TechnoSecurity California 2019 has been extended.
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (1235 reads)

Interview With Damir Delija, Senior Lecturer, Zagreb University

Wednesday, September 26, 2018 (17:21:47)
Damir, you're a Senior Lecturer at Zagreb University of Applied Sciences (TVZ). Tell us a bit about yourself and how you started working in digital forensics.

I've been involved in digital forensics since about 2008, before that other things in IT, mostly UNIX system administration. I've also being teaching and lecturing since the late 90's. My exposure to security is a long one, what always fascinated me was how impossible it is to introduce solid security into education and into everyday commercial practices.

In 2008 I joined a local company, Insig2, which promotes and sells forensic products. Our plan was to cover the local market with professional products and reliable support. It turned out to be completely different from how we'd planned it, with a lot of traveling around the world.

Read More
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (654 reads)

Forensic Focus Forum Round-Up

Wednesday, September 26, 2018 (13:16:30)
Welcome to this month’s round-up of recent posts to the Forensic Focus forums.

Can you help mkwest recover data from a DVR?

Forum members discuss a mystery involving encrypted files and strange MFT entries.

Is it always possible to recover data from a hard drive? Add your thoughts on the forum.

How would you concatenate these video files?

Can you help KCForensics to restore an image in a forensically sound way?
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (792 reads)

AccessData To Provide Training To European Digital Forensics Investigators

Wednesday, September 26, 2018 (10:39:08)
Today, AccessData Group announced that it partnered with IACIS in a consortium led by INsig2 to deliver professional training in digital forensics to European law enforcement agencies.
  • Posted by: hhagene
  • Topic: News
  • Score: 0 / 5
  • (753 reads)

Walkthrough: Analyze DI Face Detection Recognition

Friday, September 21, 2018 (14:21:17)
Let’s check out the new features of the Face Detection within Griffeye Analyze DI. Make sure in the Analyze Forensic Market you have the Face and Video utility pack both activated before you create your case. Once you do so, we can go ahead and create a new case, and bring in our data. I’m going to call it the ‘Training Case – Faces’. Bring in the folder containing the images in our investigation.

Now, when you bring the case in, make sure that you have the Face Detection and Recognition turned on in the video options and, after the import is done, make sure that you have the face detection app checked so that it can run after it ingests the data. Now, Griffeye is going to go through its normal ingestion process, analyzing and doing what it needs to do, and once this process is done, it will begin running the face detection app that we can then use later, as you can see here.

Read More
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (781 reads)

Review Of BlackLight From BlackBag

Thursday, September 20, 2018 (14:49:46)
by Scar de Courcier

In recent months there have been several new and exciting developments to BlackBag’s BlackLight solution. BlackLight helps investigators to analyse computer volumes and mobile devices; it can acquire Android and iPhone devices and runs on Mac or Windows. We took a look at some of the latest changes and how they work.

Read More
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (859 reads)

Job Vacancy: MI5 - Covert Technical Operations Specialist

Wednesday, September 19, 2018 (16:35:57)
Major disruptions ahead for terrorists.

At MI5, we help to keep the country safe. Our talented teams work against ever-evolving threats, from terrorism to espionage. In Covert Technical Operations, our specialists disrupt the work of potential terrorists. Leading on high-profile cases, they use technical capabilities to collect vital intelligence. And now we’re looking for more forward-thinking individuals to join us.

Working within legal frameworks, you’ll find innovative ways to gain access to computers and devices that belong to suspected terrorists. You’ll learn to quickly solve technical problems in tactical, covert and creative ways - providing unique insights into the threats we face. You’ll come to understand the risks posed by particular individuals and groups. Working collaboratively with other investigators, teams and intelligence agencies, you’ll be required to explain complex topics to a non-technical audience, making sure everyone has a good understanding of your work.

Read More
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (902 reads)

Word Forensic Analysis And Compound File Binary Format

Tuesday, September 18, 2018 (15:14:37)
by Arman Gungor

Microsoft Word forensic analysis is something digital forensic investigators do quite often for document authentication. Because of the great popularity of Microsoft Office, many important business documents such as contracts and memoranda are created using Word. When things go south, some of these documents become key evidence and subject to forensic authentication.

My goal in this article is to review a sample Word document in Word Binary File Format, take a look at the underlying data in Compound File Binary (CFB) file format and see what we can find out beyond what mainstream tools show us.

I chose a sample in Word Binary Format (i.e., .doc) rather than in Word Extensions to the Office Open XML File Format (i.e., .docx) because many other file types in the Microsoft universe, such as MSG files, are also based on the CFB file format. I consider CFB to be a treasure trove of forensic artifacts.

Read More
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (1274 reads)

Webinar: Fraud, IP Theft, And An Intrusion - A Case Study

Tuesday, September 18, 2018 (14:33:14)
When you’re faced with an intrusion — whether you were brought in as an outside consultant or are responsible for incident response for your organization — your stakeholders or management ask the same question: What did they take, and how did they get in?

In order to answer these questions, examiners must correlate a lot of different data. From the primary source files of interest, to system and network logs, to supporting artifacts that indicate user and file activity, there is a lot of data to go through and having a sound process and reliable tools can help answer these questions.

In this webinar, Nathan Little, Gillware Digital Forensics and Jamie McQuaid, Magnet Forensics will use a real case to demonstrate how Magnet AXIOM can be used to help identify the source of an intrusion and what sensitive data was taken by the attackers.

Join us for this live webinar where you’ll not only be able to learn more about how you can get all this information using AXIOM, but you can ask the experts questions during a live Q&A.

Presenters: Nathan Little, Gillware Digital Forensics and Jamie McQuaid, Magnet Forensics

Tuesday, September 25th @ 1:00PM EDT
Register here

Wednesday, September 26th @ 9:00AM EDT
Register here
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (1147 reads)