From Automation To Exploitation: The Growing Misuse Of Selenium Grid For Cryptomining & Proxyjacking

Hero Image

Cado Security reveals two campaigns turning Selenium Grid from a tool of automation into a weapon for cryptomining and proxyjacking....

Magnet One Now Available – Experience The Future Of Digital Investigations

Magnet One Now Available – Experience The Future Of Digital Investigations

Introducing Magnet One, an innovative investigative platform to connect your existing digital forensics apps and tools, case data and investigative teams....read more

Video Formats And Conversion: A New Blog Series By Amped Software

Video Formats And Conversion: A New Blog Series By Amped Software

David Spreadborough from Amped Software introduces a new blog series on video formats and conversion....read more

Detego Global Partners With Better Direct For U.S.-Wide DFIR Rollout

Detego Global Partners With Better Direct For U.S.-Wide DFIR Rollout

Detego Global partners with Better Direct to make their advanced digital forensics and incident response tools more available across all 50 states and U.S. Federal offices abroad....read more

RCFL Network Launches 9th Laboratory

The Northwest Regional Computer Forensics Laboratory (NWRCFL) officially opened yesterday in Portland, Oregon. The NWRCFL will supply digital forensics expertise and training to hundreds of law enforcement agencies throughout all of Oregon and southwestern Washington. The NWRCFL is the ninth

Alternative browsers pose challenge for cybersleuths

Internet Explorer hides nothing from police and other investigators who examine PCs to discover which sites the user has visited, according to a class held Wedensday at the annual training meeting of the High Tech Crime Investigation Association. Investigators know

New South Wales workplace watchdog law ‘a formality’

The use of email and computer facilities in NSW workplaces will be under watch from October when the Workplace Surveillance Act comes into force, but the head of an email security firm says there is nothing to fear. Peter Croft,

ICTA starts training in computer crimes enforcement for Sri Lanka police

When draft legislation for computer crimes was submitted to parliament recently, the Ministry of Defence together with the Information and Communication Technology Agency of Sri Lanka (ICTA) took necessary steps to establish a Computer Crimes Unit at the Police Department.

New forensic computing company in the UK – Innovision

Andy, one of our longest standing members and forum regular, has moved into private practice with the establishment of Innovision, a forensic data investigation service based in the UK. I asked Andy to sum up the services his firm will

Submissions Being Accepted for Timothy Fidel Award

PASADENA, Calif., Aug. 31 /PRNewswire/ – Building on the success of the inaugural Timothy Fidel Memorial Award, Guidance Software along with AccessData, today announced the Timothy Fidel Memorial Award Committee. The Committee was created as the decision making body for

Computer forensic experts to track copied Clio e-mails

The [Clio] Board of Education voted unanimously Monday to hire a computer forensics company to investigate e-mail tampering in the district. Board members said they hope the investigation by Southfield-based Center for Computer Forensics reveals who has gained access to

Forensics is not just a word for cops

Last year, two employees of AdvantaCare Health Partners resigned and launched their own start-up. Prior to leaving, they copied patient databases, confidential business plans, and other trade secrets, and used this information to compete with AdvantaCare. Before leaving, they tried

Group honors high-tech work on BTK

A Wichita police detective who helped solve the BTK murder cases has won an international crime investigation award. Detective Randy Stone, whose computer sleuthing provided a turning point in the hunt for BTK, will be given an award for “forensics

Storm brewing over SHA-1 as further breaks are found

Three Chinese researchers have further refined an attack on the encryption standard frequently used to digitally sign documents, making the attack 64 times faster and leaving cryptographers to debate whether the standard, known as the Secure Hash Algorithm, should be

Computer Forensics and Its Impact on Employment Litigation

Computer forensics is becoming a routine part of many employment cases. To cite a few recent examples handled by our firm: After a key employee suddenly resigned, the employer hired a computer forensics company to search the hard drive of

New forensic software released

With a raft of bogus bank Web sites and phishing scams flooding computers, it would appear that crime has gone dotcom like everything else. However, a new forensic tool has stepped into the computer crime scene to help search, not

Messages of fear in hi-tech invisible ink

The first sign that something was amiss came a few days before Christmas Eve 2003. The US department of homeland security raised the national terror alert level to “high risk”. The move triggered a ripple of concern throughout the airline

Judge weighs access to victim’s PC

The attorney representing Michael Hernandez, the teen charged with murdering his classmate last year in the bathroom of their middle school, wants to peek into the victim’s mind by scanning through the memories of the slain boy’s computer… More (Sun-Sentinel.com)

New paper: An Analytical Approach to Steganalysis

A new paper, "An Analytical Approach to Steganalysis" by James Wingate and Chad Davis, is now online and can be found here. A full list of articles and papers held at Forensic Focus can be found here. New submissions are

Software hide and seek

Delete isn’t enough anymore. Consider the case of Robert Johnson, the former Newsday publisher who, prosecutors allege, used a software program called Evidence Eliminator to rid his computers of CP. Pressing ”delete” makes files invisible, perhaps, but it doesn’t make