±Forensic Focus Partners

Become an advertising partner

±Your Account


Forgotten password/username?

Site Members:

New Today: 0 Overall: 33653
New Yesterday: 3 Visitors: 214

±Follow Forensic Focus

Forensic Focus Facebook PageForensic Focus on TwitterForensic Focus LinkedIn GroupForensic Focus YouTube Channel

RSS feeds: News Forums Articles

±Latest Articles

RSS Feed Widget

±Latest Webinars

Page 2

Search on This Topic: News

[ Go to Home | Select a New Topic ]

Register For Webinar: Griffeye 101: A Crash Course in Visual Media Investigation

Friday, March 09, 2018 (13:06:57)
The explosion and volume of digital images and videos captured by CCTV, smartphones, tablets, digital cameras, body worn cameras, and dash cams presents significant challenges to analysts, investigators, and forensic examiners. In this webinar, students will learn about:

- Pre-categorization based on known hashes
- Processing vast amounts of multimedia data collected from multiple sources and forensic tools
- Automatically eliminating and prioritizing information
- Detecting critical clues through automated routines and visual navigation
- Identifying relationships between files based on their EXIF
- The basics of “Fuzzy hashing”
- Photo matching in the absence of EXIF data
- Object recognition in videos

Date: Friday 16th March 2018
Time: 3pm CET / 2pm GMT / 9am EST

Presenter: Rey Navarro, Senior Director, North America, Griffeye Technologies

Register here.
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (758 reads)

Webinar: How The Onset Of Security Apps Is Impacting Investigations

Friday, March 09, 2018 (10:03:11)
A new webinar, How The Onset Of Security Apps Is Impacting Investigations, is available to view here.

Join Jessica Hyde, Director of Forensics at Magnet, for a look into vault and security apps with a focus on Cheetah Mobile apps including file managers, cleaning apps, private browsers and app locks. She will focus in on what type of artifact evidence apps like these can leave behind and what you should be aware of as an investigator when dealing with these apps.

Join the forum discussion here.
View the webinar on YouTube here.
Read a full transcript of the webinar here.
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (643 reads)

Cellebrite Arms Forensic Examiners With Unparalleled Analysis Capabilities

Thursday, March 08, 2018 (10:26:34)
Cellebrite Arms Forensic Examiners with Upgraded, Unparalleled Access and Analysis of Digital Evidence

New extraction capabilities in UFED Ultimate allow robust examination from key new sources in a single environment, complimentary inclusion of public social media data via UFED Cloud Analyzer.

Cellebrite, the leading provider of digital intelligence solutions, has introduced a comprehensive upgrade to its portfolio of offerings to provide examiners with new capabilities that provide unrivaled access to evidence from locked or encrypted mobile devices via UFED Ultimate. In addition, by providing a complimentary UFED Cloud Analyzer public domain product license available to all active UFED Ultimate customers, teams can enrich digital examinations with rapid access to public social media data.

AI And Machine Learning: The Future Is Now

Thursday, March 08, 2018 (08:51:49)
It seems that in the last few years Artificial Intelligence (AI) has really come of age. With machine learning at the heart of the latest advances in AI, researchers have acquired new knowledge and methods to achieve impressive results across a wide range of areas including image and video recognition and analysis. And what’s more, these techniques and results are now within easy reach for investigators and their teams.

By Johann Hoffmann, Head of Griffeye, and Pelle Gara, Director & Co-founder of Griffeye.

Oxygen Drone Forensics

Tuesday, March 06, 2018 (12:35:04)
It was not too long ago when drones were discussed we would often think of military use or large commercial type applications. However, today drones are now in the hands of hobbyists who frequently use the devices for taking aerial pictures and shooting unique video footage. Not to mention law enforcement use them to monitor traffic conditions, and some companies are even starting to deliver packages in busy cities.

Criminals have now set their sights on these easily purchased devices due to their many features, including carrying payloads, flying great distances, and their anonymity. Drones have even been used by criminals to commit stalking crimes by using them to spy on their victims. With more than 770,000 registered drones in the United States alone, the issue of drone misuse has become a part of regular news stories and is quickly getting out of control.

Read More
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (639 reads)

Magnet AXIOM 1.2.4 Brings New Capabilities To Bypass Android Passwords

Tuesday, March 06, 2018 (09:53:24)
Magnet AXIOM 1.2.4 is now available for customers to download. With the latest release of AXIOM, we’re bringing new capabilities to bypass Android passwords, full cloud token integration, McAfee Decryption, and more.

Crash Course In Visual Media Investigation

Monday, March 05, 2018 (16:54:47)
On the 16th of march, Griffeye is hosting a webinar on how to investigate large volumes of images and videos in the most effective way. In a one and a half-hour crash course, participants will learn how Griffeye technology can help to process, analyze, visualize, manage and build intelligence from mass quantities of digital media.

Video: Network Forensic Investigation In Openflow Networks With ForCon

Monday, March 05, 2018 (11:57:23)
Daniel Spiekermann discusses his research at DFRWS EU 2017.

Spiekermann: I would like to present a paper of digital investigation in OpenFlow networks with ForCon. I am a PhD student at the FernUniversitat in Hagen and the topic of virtual networks and network forensic investigation is my focus.

Before, I would like to start with a scenario – just imagine you work for a law enforcement agency, [as Martin mentioned before], maybe the state police, and you have a project. You have the job to wiretap the traffic of the red virtual machine. Typically, the network forensic investigation differs slightly, the network forensic investigation in law enforcement differs slightly from common network forensic investigation, I would say, in a company, whereas the focus is on to capture the traffic of all hosts, but you only capture traffic which you pre-define. In wiretapping something, you try to capture every packet of the system of interest.

Read More
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (521 reads)

Rafik Hajem Joins AccessData As Vice President Of Sales For EMEA Region

Friday, March 02, 2018 (15:53:07)
Former head of EMEA region for Guidance Software to be based in AccessData’s new Paris office.

AccessData Group, a leading provider of integrated digital forensics and e-discovery software, today announced the appointment of Rafik Hajem as Vice President of Sales for the Europe, Middle East and Africa (EMEA) region.

Hajem is a highly regarded veteran of the digital forensics and e-discovery software industries. For nearly five years, he has served in a variety of sales positions at Guidance Software—now part of OpenText—and has more than 25 years of experience working with various technology companies throughout Europe.

Watch The Recent Cellebrite Webinar

Friday, March 02, 2018 (14:21:33)
If you missed the recent Cellebrite webinar, Access mobile device evidence faster using Emergency Download mode (EDL), then have no worries! We’ve recorded it for you!

Click here to access the webinar!

During the webinar you will discover how Cellebrite’s unique automatic Emergency Download mode (EDL) capability can provide you with forensically-sound access to extract physical data from devices. Industry experts discuss how using EDL mode and Cellebrite’s unique capabilities provide a valuable alternative method to recover device evidence as compared with other more traditional, time-consuming methods such as ISP, JTAG or Chip-off.

If you would like more information or have any questions on how Cellebrite can help accelerate your toughest investigations and other digital forensic challenges, click here.

The Cellebrite Team