±Forensic Focus Partners

Become an advertising partner

±Your Account


Forgotten password/username?

Site Members:

New Today: 0 Overall: 33948
New Yesterday: 0 Visitors: 204

±Follow Forensic Focus

Forensic Focus Facebook PageForensic Focus on TwitterForensic Focus LinkedIn GroupForensic Focus YouTube Channel

RSS feeds: News Forums Articles

±Latest Articles

RSS Feed Widget

±Latest Webinars

Page 3

Paraben’s New 1.7 Version of E3 Platform

Friday, April 13, 2018 (11:08:26)
Launched with new iCloud, Zimbra, WeCha and Windows 10 Artifact Support for Cortana!

Paraben Corporation has leapt into Spring 2018 with the release of version 1.7 of the E3 Platform. This platform brings all digital investigation capabilities into a single interface for easy management of data from computers, email, internet, and mobiles. “With no switching of tools required, you end up with a faster processing time and are able to find evidence tidbits that you might have missed.” commented Amber Schroader, Paraben’s CEO. Paraben’s E3 1.7 version brings together new capabilities in all aspects of the examination process.
  • Posted by: Shan
  • Topic: News
  • Score: 0 / 5
  • (1012 reads)

Now released: XRY 7.7, XAMN Spotlight 3.2 and Elements 3.2 and XEC Director 3.1

Friday, April 13, 2018 (08:12:38)
New and improved versions of all of these MSAB products are now released and available for download by customers.

New XAMN Elements is now available for purchase, after being in beta test. We have added many improvements to Elements based on customer feedback.

MSAB & URSA Inc. Partner on Drone Forensic Technology

Thursday, April 12, 2018 (08:05:29)
Partnership unites two leading companies, enhancing and expanding drone forensic capabilities globally

MSAB, the global leader in mobile forensics solutions, today announced that the company has partnered with URSA Inc., expanding tremendously on its’ drone forensic capabilities.

URSA’s Idetic™ Unmanned tools are designed to collect, integrate, analyze, and present UAV related data. The company provides the most accurate understanding of drone telemetry data and metadata to support academic, law enforcement, insurance, and intelligence investigations in the rapidly evolving unmanned vehicle and robotics ecosystem.
  • Posted by: josh217
  • Topic: News
  • Score: 0 / 5
  • (1389 reads)

Oxygen Forensics Continues Leadership Position on Drone Forensics

Tuesday, April 10, 2018 (07:01:21)
Oxygen Forensics, a worldwide developer and provider of advanced forensic data examination tools for mobile devices, cloud services and drones, announced today that its flagship software product, Oxygen Forensic® Detective v. 10.2, offers forensic detectives the industry-first ability to extract all information from a DJI drone with only a USB cable.

The new Oxygen Forensic Detective v.10.2 allows forensics experts to connect the drone to their examination computer via USB cable and conduct a physical collection of the embedded storage chip. Once Oxygen Forensic Detective recognizes the drone, a physical acquisition is available in only a few clicks that then reveals the drone’s complete flight history with GPS locations and metadata. This data includes valuable facts like speed, altitude, direction, and other evidentiary parameters. The drone flight path is then visualized in the built-in Oxygen Forensic® Maps (both online and offline) which gives a clear picture of where the drone has traveled.

Introducing Griffeye Analyze DI For Visual Media Investigations

Thursday, April 05, 2018 (12:00:27)
Approximately 200 people joined our “Griffeye 101: A crash course in visual media investigations” webinar to learn how Griffeye Analyze DI Pro can help speed through cases involving massive amounts of pictures and videos.

PFIC Agenda Launched & Keynote Announced

Thursday, April 05, 2018 (08:40:59)
11th Annual PFIC event is back where it all started in Park City, Utah.

PFIC is honored to have Jenni Morse from Operation Underground Railroad (O.U.R.) as the 2018 PFIC keynote speaker. O.U.R. is a non-profit organization dedicated to working with law enforcement to help rescue victims of sex trafficking and prosecute traffickers. O.U.R. also vets and assesses aftercare centers around the world which consists of partnering with different organizations, so that the rescued children may receive safety, education, and vocational training. Jenni Morse a former Assistant District Attorney is responsible for studying U.S. and International laws on sex trafficking and cybercrimes; liaising with prosecutors, law enforcement and judges worldwide; evaluating the needs of each country’s law enforcement; and coordinating requested training and vital equipment. PFIC is pleased to bring this topic to light to more of the professionals in the field that might be able to aid in the mission.
  • Posted by: Shan
  • Topic: News
  • Score: 0 / 5
  • (1430 reads)

Webinar: Ask An Expert: How Will APFS Impact My Investigations?

Wednesday, April 04, 2018 (12:30:45)
A new webinar, Ask An Expert: How Will APFS Impact My Investigations?, is available to view here.

BlackBag’s latest webinar reviews the release of their powerful tools, BlackLight 2018 R1 and MacQuisition 2018 R1, which when combined, creates the world’s first and only complete end-to-end acquisition, decryption, and analysis solution for the latest Apple File System (APFS). In this webinar, BlackBag’s Dr. Joe Sylve will cover what you need to know to identify and work with APFS volumes - including what copy-on-write and pooled storage mean for recovery.

Join the forum discussion here.
View the webinar on YouTube here.
Read a full transcript of the webinar here.
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (1003 reads)

Finding Metasploit’s Meterpreter Traces With Memory Forensics

Tuesday, April 03, 2018 (08:50:47)
by Oleg Skulkin & Igor Mikhaylov

Metasploit Framework is not only very popular among pentesters, but is also quite often used by real adversaries. So why is memory forensics important here? Because Meterpreter, for example – an advanced, dynamically extensible Metasploit payload – resides entirely in the memory and writes nothing to the victim’s drive. In this article we will show you how to use the Volatility Framework to find Metasploit traces with memory forensics.

As we are analyzing a memory image, first of all we should gather information about the operating system to choose the right Volatility profile. If you ask us, the best practice here is to document the OS version during memory imaging process, as Volatility does not always detect it correctly. Anyway, if you get the memory image from the third party and the OS version is unknown, use the imageinfo plugin.

Read More
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (1436 reads)

2018 Nuix Insider Conference Recap

Monday, April 02, 2018 (11:40:53)
by Jessica Lyford

Close to 300 customers, partners, and guests converged at the Royal Lancaster London for Nuix’s annual Insider Conference last week to share their experience using Nuix or to learn something new to address their data, cybersecurity, risk, and compliance challenges. The scale of this year’s event symbolizes Nuix’s growth within the region, reflecting incredible growth within the region and globally.

The agenda was ambitious and offered something to pique everyone’s interest. The event kicked off with four keynote speakers before the bulk of the day was split into hands-on labs and sessions, which were divided into tracks for corporate, government, and law enforcement attendees. The day wrapped up with a lively customer panel, with panelists discussing current events and the best practices they’ve employed within their enterprises.

Read More
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (1037 reads)

Jailbreaking iOS 11 And All Versions Of iOS 10

Friday, March 30, 2018 (15:08:07)
by Oleg Afonin, Mobile Product Specialist at ElcomSoft

Jailbreaking iOS is becoming increasingly difficult, especially considering the amounts of money Apple and independent bug hunters are paying for discovered vulnerabilities that could lead to a working exploit. Late last year, a bug hunter at Google’s Project Zero discovered one such vulnerability and developed and published an exploit that gave birth to a plethora of jailbreak tools for all versions of iOS 10 as well as iOS 11.0 through 11.1.2. The newly emerged jailbreaks are all exploiting the same vulnerability. Moreover, they are all using the same off-the-shelf exploit to jailbreak the device. However, there are major differences between the newly emerged jailbreaks that are worth explaining.

Read More
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (1268 reads)