±Forensic Focus Partners

Become an advertising partner

±Your Account


Forgotten password/username?

Site Members:

New Today: 3 Overall: 36209
New Yesterday: 7 Visitors: 146

±Follow Forensic Focus

Forensic Focus Facebook PageForensic Focus on TwitterForensic Focus LinkedIn GroupForensic Focus YouTube Channel

RSS feeds: News Forums Articles

±Latest Articles

±Latest Videos

±Latest Jobs

Page 4

TikTok Data Extraction In Oxygen Forensic Detective

Friday, October 25, 2019 (10:57:52)
What is it?

TikTok, an emerging app is rapidly gaining popularity. It recently unseated Instagram, YouTube and Snapchat as the top free app in Apple’s App Store . As of Nov. 6 2018, according to industry research firm App Annie, the app ranked first among photo and video apps in daily iPhone downloads in the US.

Comprehending The IoT Cyber Threat Landscape

Thursday, October 24, 2019 (17:59:08)
Morteza Safaei Pour shares his research at DFRWS EU 2019.

Morteza: Hello and good morning - my name is Morteza Safaei Pour, from CTI Lab Florida Atlantic University. Today I'm going to talk about comprehending the IoT cyber threat landscape, and how we get information about IoT maliciousness and IoT probing campaigns.

So we heard a lot about the Internet of Things. There are many of these devices produced every day and connected to the network. We expect by 2025 that more than 75 billion of these devices [will be] connected to the network. These devices are ranging from network devices, IP cameras, smart homes, to cyber physical systems and serial control systems.

And usually, people connect these devices directly to the internet, or these devices use some protocols like ports and connect to the public network. It's kind of interesting to mention that, if you have a brand new device and connect it to the network, it takes a few seconds to a few minutes to get infected by one of the IoT malwares.

Read More
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (1035 reads)

Unlock Mobile Devices Using These Popular Codes

Thursday, October 24, 2019 (15:37:45)
We have collected thousands of pattern lock codes for Android using our Burner Breaker technology and we have discovered the top gesture codes used to UNLOCK Android devices.

For example, the most popular pattern lock code is 3 > 2 > 5 > 8 > 7, as displayed in the image.

We are giving away ALL of our findings for multiple types of passcodes!

Get the Codes Now!

Webinar: Timesaving Forensic Techniques For Your Next Case

Wednesday, October 23, 2019 (17:55:43)
A new webinar, Timesaving Forensic Techniques For Your Next Case, is available to view here.

Join the forum discussion here.
View the webinar on YouTube here.
Read a full transcript of the webinar here.

Read More
  • Posted by: scar
  • Topic: All
  • Score: 0 / 5
  • (752 reads)

New Online Training Courses From MSAB: XRY Recertification And XRY Refresher

Tuesday, October 22, 2019 (15:04:24)
Mobile forensics is a fast-changing field — devices and apps are constantly changing, and so are the tools used by mobile forensic examiners and investigators.

Two new and/or updated on-demand, online training courses are now available from MSAB to help mobile forensic professionals maintain their skills, keep up to date with the latest changes and software and maintain XRY product certification to validate their expertise if they need to testify in court or in other settings.

The Mueller Report Part 3 – Human-Generated Data At The Heart Of Investigations

Tuesday, October 22, 2019 (14:58:58)
by Stephen Stewart, CTO, Nuix

Preface: This article is all about the data discussed in Part 1 of this blog series. No political statements are being made.

The Mueller Report is a great window into the relative value of data, both for adversaries and for investigators. In Part 1: The Mueller Report – An Amazing Lens Into a Modern Federal Investigation I covered all of the different types of data collected and analyzed for the report.

• 2800 subpoenas. With 87 references to Facebook and the detailed documentation about the activity of certain profiles, you can assume that the Office was sifting through Facebook, Twitter, and Instagram data.
• 500 search and seizure warrants. This is bound to generate at least a couple hundred hard drives and mobile devices.
• 230 2703(d) and 50 “pen registers”. This is interesting because it laser focused on who is talking to whom and the frequency of their communications.
• 500 witnesses. That is a whole lot of testimony that needs to be checked against all the digital evidence.

Read More
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (905 reads)

Clearing The Way With Magnet OUTRIDER

Tuesday, October 22, 2019 (14:13:30)
Magnet Forensics is proud to introduce Magnet OUTRIDER — a new and easy way for officers and investigators to check devices for digital contraband. OUTRIDER is an intuitive preview tool that quickly scans smartphones and computers to determine if there is illicit material present and to develop a risk profile of the target user.

For a limited time, Magnet OUTRIDER is available as an extended free trial. Visit magnetoutrider.com to take part!

What Changes Do We Need To See In eDiscovery? Part III

Monday, October 21, 2019 (12:32:50)
by Harold Burt-Gerrans

At the end of Part 2, I put forth an argument that de-duplication should always be done globally to bring the data set down to just unique documents. And now that you’re convinced (or should have been) that Global De-Duplication is the only way to go, I’m going to completely blow your mind by reversing my opinion and say:

“There should be no de-duplication at all, every document collected should be represented in the document review platform.”

Or at least, that’s what the end users should see…. Not everything is as it appears. Trust in magic.

My observation from most review platforms that I have seen is that they are typically structured from what I call a “Scanning Mentality,” where each document family consists of a lead document and its attachments.

Read More
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (873 reads)

The New MSAB Kiosk Mk III: Now Available For Demonstration And Pre-Release Order

Friday, October 18, 2019 (17:23:08)
With faster extraction speeds, a sleek new design, and many enhanced capabilities.

MSAB is excited to announce the introduction of the new MSAB Kiosk Mk III, the latest version of our market-leading frontline mobile forensic tool. The Kiosk has been instrumental in enabling many organizations to decentralize their mobile forensic operations for increased efficiency and improved performance. The Kiosk allows organizations to scale their extraction power, by enabling users with minimal training to process many devices, and free up the forensic lab experts to focus on the most challenging devices and cases.

With the launch of the Kiosk Mk III, you now have a new tool to help you unlock and distribute the full power of mobile forensics for frontline users and further improve your organization’s efficiency.

Crimes Against Children Conference 2019 Recap Part I: Technology

Friday, October 18, 2019 (12:16:44)
by Christa Miller, Forensic Focus

Celebrating its 31st year, the Crimes Against Children Conference ran from 12-15 July 2019 in Dallas, Texas. The conference kicked off with opening remarks by Lynn M. Davis, President and Chief Executive Officer of the Dallas Children’s Advocacy Center (DCAC), who focused on the DCAC’s new “Save Jane” initiative. Updated with the photos and names of local missing and endangered children, this video project is designed to be shareable and scalable for use by every community in the United States.

President and co-founder of Watch Systems Mike Cormaci spoke about his company’s sex offender registry management and community notification solution, OffenderWatch, which relies on relationships with the 15,000 users in its network to provide accessible statistics about sex offenders in any given community.

Read More
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (3424 reads)