±Forensic Focus Partners

Become an advertising partner

±Your Account


Username
Password

Forgotten password/username?

Site Members:

New Today: 0 Overall: 32461
New Yesterday: 4 Visitors: 127

±Follow Forensic Focus

Forensic Focus Facebook PageForensic Focus on TwitterForensic Focus LinkedIn GroupForensic Focus YouTube Channel

RSS feeds: News Forums Articles

±Latest Articles

RSS Feed Widget

±Latest Webinars

Page 3

Interview With Edewede Oriwoh, Independent Cyber-Physical Security Researcher

Tuesday, June 27, 2017 (07:20:57)
Edewede, you spent some time as a post-doctoral researcher at the University of Bedfordshire. What was your area of study, and what first sparked your interest in it?

My research involved investigating security threats in Smart Homes (SH) and developing an anomaly detection framework and a presence detection model for Smart Homes. It was clear in the early stages of my research that security was (and this is sometimes the case with major technological developments) not quite prominent in discussions and developments around the IoT. In recognition of the importance of the security within SH, I developed the concept of a Cyber-physically secure “Happy Home” which is a baseline security model in which all the elements in a SH are at their most secure state. These elements are a set of attributes (or features) which can be used to build a “Happy Home” - or the equivalent for any other Cyber-physical environment. Deviations from this baseline can be used to identify anomalies in the overall SH system.

Read More
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (998 reads)

RAM Forensic Analysis

Monday, June 26, 2017 (09:25:40)
by Eliézer Pereira

1 Goal


The purpose of this article is show how to perform a RAM memory forensic analysis, presenting some examples of information that can be retrieved and analyzed to help identify indications of security incidents as well as fraud and other illegal practices through information systems.

2 Good Practices and Techniques for Computer Forensic Analysis

2.1 NIST 800-86


The National Institute of Standards and Technology (NIST) is known worldwide for the publication of documents that bring well detailed and well comprehensive technology standards.

Document 800-86 – Guide to Integrating Forensic Techniques into Incident Response has a number of recommendations for proceeding with forensic analysis of security incidents, from data collection to the preparation of a final report.

Read More
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (1115 reads)

Job Vacancy: Lecturer In Digital Forensics (2 Posts)

Friday, June 23, 2017 (11:45:23)
School of Cranfield Defence and Security

Lecturer in Digital Forensics (2 posts)

Permanent

Lecturer Salary: £41,153 to £45,872 per annum (with additional performance related pay up to £57,340 per annum)

Location: Shrivenham, Oxfordshire, SN6 8LA

Here at Cranfield, we can offer you the opportunity and resources to really develop your career. Cranfield Defence and Security (CDS) provides unique educational opportunities to the defence and security sectors of both public and private sector organisations.

Cranfield Forensic Institute (CFI) provides a Centre of Excellence for the application of science and technology to law enforcement particularly, through forensic science and engineering. The Digital Forensics Unit is part of the Cranfield Forensic Institute and is in a fast moving academic and practical arena, with sought after expertise and considerable credentials in the area of forensic computing. The MSc in Digital Forensics run by the Digital Forensics Unit was the first Digital Forensics course to gain full certification from GCHQ.

Read More
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (912 reads)

Remote Forensics Of Windows 10 Mobile Devices

Friday, June 23, 2017 (07:50:24)
by Oleg Afonin, Elcomsoft

Microsoft has developed Windows 10 as the one OS for all types of devices from servers to wearables. Desktops, laptops, two-in-ones, tablets and smartphones can (and do) run a version of Windows 10. There are countless forensic tools for acquiring evidence from the desktop version of Windows 10, much less for Windows-powered smartphones.

Forensic analysis of Windows 10 Mobile devices can be complicated due to the exotic status of such devices. Due to full-disk encryption, on-device access may not be an option. However, Microsoft collects enormous amounts of information from its users. This information is then stored in the user’s Microsoft Account. Some bits of data are fully accessible to the user, while access to some other bits (such as mobile backups) is restricted.

Read More
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (1054 reads)

Laminar Flow Cabinet from HddSurgery

Thursday, June 22, 2017 (12:49:00)
HddSurgery Ltd. is a global leader in providing professional data recovery and computer forensic hardware tools since 2009.

Our mission is to find optimal solutions for common mechanical problems with hard drives, such as broken heads, head stiction and jammed spindle.

Beside the tools which solve these problems, our company provides assistive data recovery tools like Workbench, Platter stand, Head holder and Unlock key.

This year we introduced the most sophisticated product from our company – HDDS Horizontal Laminar Flow Cabinet M.

Interview With Cesar Leon, Head Of Support Team, Oxygen Forensics

Thursday, June 22, 2017 (09:24:52)
Cesar, you're Head of the Support Team at Oxygen. Tell us about your role - what does your day-to-day job look like?

Hey! My role right now is to help my team supporting our software to our end users all over the world, to the best of our abilities. Whether that be with helping with technical issues, or commercial issues, I help my team with whatever questions or concerns they need.

My day to day really varies, as one day it can be all research into why a particular problem is occurring with the software, or another day helping our Sales Team complete a huge order. I’m a jack of all trades for the company, and every day brings new challenges and tasks.

Read More
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (741 reads)

Digital Forensics News June 2017

Wednesday, June 21, 2017 (10:16:11)
ADF Solutions have partnered with Belkasoft to help their customers analyse mobile devices.

Christopher Woods from Nuix talks about the need for training to focus on the practical rather than the theoretical.

Atola Technology continue their series of how-to blog posts with a guide to creating a logical image of a source drive.

Greg at Trewmte has written about WhatsApp network forensics.

Belkasoft have released Evidence Center v.8.4.
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (1222 reads)

Belkasoft Evidence Center 8.4 Offers Advanced Mobile Forensics

Wednesday, June 21, 2017 (07:54:16)
Belkasoft rolls out a major update to Belkasoft Evidence Center 2017. The new release delivers major improvements in mobile forensics, offering low-level data extraction from Android smartphones and logical and over-the-air acquisition of iOS 10.x devices.

More: https://belkasoft.com/new
Try free: https://belkasoft.com/get
Sign up to a webinar: https://belkasoft.com/webinar

Webinar: Information Overload: Navigating In Today’s Regulatory Environment

Tuesday, June 20, 2017 (10:48:14)
Webinar: Information Overload: Navigating Information Risk, Investigations & Privacy in Today’s Regulatory Environment (…and Staying Compliant)

http://bit.ly/2szneQS

June 27th
Information Risk and Compliance in the Information Age

July 11th
Managing Internal Investigations Swamped With Data

July 25th
It’s No Secret: What New Data Protection Regulations Mean for Risk Management

All webinars will be held at 8:00 AM PT /11:00 AM ET / 4:00 PM UK
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (937 reads)

Paraben Corporation Introduces Cyber-Forensic Symposium

Monday, June 19, 2017 (11:03:11)
Paraben Corporation along with Robert Morris University are bringing together industry experts to discuss current trends in cyber security and forensics. This symposium is designed to educate digital forensic practitioners on innovative and emerging topics in digital forensics through lectures and networking.
  • Posted by: Shan
  • Topic: News
  • Score: 0 / 5
  • (1536 reads)