±Forensic Focus Partners

±Your Account


Nickname
Password


Forgotten password/username?


Membership:
New Today: 0
New Yesterday: 4
Overall: 27878
Visitors: 41

±Forensic Focus Partner Ads

Join our LinkedIn group

Subscribe to news

Subscribe to forums

Subscribe to blog

Subscribe to tweets

How Secure Is Your Password?

Sunday, February 01, 2015 (10:33:55)
How many passwords does an average Joe or Jane have to remember? Obviously, it’s not just one or two. Security requirements vary among online services, accounts and applications, allowing (or disallowing) certain passwords. Seven years ago, Microsoft determined in a study that an average user had 6.5 Web passwords, each of which is shared across about four different websites. They’ve also determined that, back then, each user had about 25 accounts that required passwords, and typed an average of 8 passwords per day.

It didn’t change much in 2012. Another study determined that an average person has 26 online accounts, but uses only five passwords to keep them secure, typing about 10 passwords per day. CSID has a decent report (opens as PDF) on password usage among American consumers, discovering that as many as 54% of consumers have five passwords or fewer, while another 28% reported using 6 to 10 passwords...

Read More
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (209 reads)

Atola Insight Forensic 4.2: Image Files on Target Media, Improved Performance

Friday, January 30, 2015 (15:59:09)
Atola Technology has announced a major update to Insight Forensic. All existing customers can freely download and install the new 4.2 software.

Having been asked many times by forensic experts to allow the creation of image files on target devices attached directly to an Atola DiskSense unit, this facility is now available.

Forensics and Bitcoin

Friday, January 30, 2015 (13:36:49)
This article does not attempt to provide a beginners guide to Bitcoin, nor an in-depth thesis on Bitcoin forensics. Rather, it will be an overview of the potential opportunities available to digital forensics and traditional investigators to obtain evidence in relation to attributing transactions or holdings to a specific person and (legally) seizing those funds.

I will discuss academic work that has been undertaken in this area, what precautions a security aware user may take and the issues introduced by them doing so. I will also discuss an open-source Python tool called BTCscan, which has been created to accompany this article and will carve out bitcoin addresses, private keys and other Bitcoin artifacts.

This article may be of interest to persons conducting investigations for criminal, civil, personal or business reasons. Some elements may be of limited relevance to agencies without powers of seizure and/or subpoena...

Read More
  • Posted by: jamie
  • Topic: News
  • Score: 0 / 5
  • (404 reads)

Estonia President wants China and Russia to help fight cyber-crime

Wednesday, January 28, 2015 (09:47:41)
Speaking on the ‘Fighting Shadows' panel at the Davos convention in Switzerland on Saturday,Toomas Hendrik Ilves joined senior figures from Kaspersky, Microsoft and the United Nations in calling for improved cyber-crime policing, laws and collaboration – whilst also calling into question how – and if - countries can respond to cyber-attacks.

Estonian websites were famously hit by distributed-denial-of-service (DDoS) attacks in 2007, which at the time was rumoured to be work of the Russian government. Subsequently, the country became one of the world's most advanced countries on cyber-security, even establishing the NATO Cooperative Cyber Defence of Excellence in Tallinn in August 2010. Ilves – who said that the country also helped with similar DDoS attacks against Georgian websites a year later – admitted that DDoS and nation-state attacks are very different things, but said that defending against cyber-criminals is almost impossible considering outdated laws...

Read More (SC Magazine)
  • Posted by: jamie
  • Topic: News
  • Score: 0 / 5
  • (628 reads)

Dealing With Records Found in SQLite Rollback Journals

Tuesday, January 27, 2015 (11:16:35)
Sanderson Forensics was recently contacted by a customer at a police force with a question relating to deleted SQLite records that were found in a rollback journal. The requirement was to create a report(s) showing both the live records in the Kik database as well as the deleted records that were found by a filename search in the rollback journal.

The article at the link below goes into a little detail of how the rollback journal works, some thoughts on recovering data from it and then details how the data was recovered from the rollback journal and then how we distinguished and created a report showing the deleted records in the journal vs the live records that were also present in the journal...

Read More (Sanderson Forensics)

Secure View 4 Almost Here - Free Upgrade To All Current Users And New Customers

Monday, January 26, 2015 (16:26:57)
Susteen Inc. has announced that Secure View 4 will be a free upgrade to ALL active Secure View users.

This will include all new customers up until the time Secure View 4 is launched. The current price for Secure View 3 stands at $2495. Although no current price for Secure View 4 has been listed, it is expected to start at $2995. This means that a new customer can still purchase Secure View at the current cost and get a free upgrade when Secure View 4 launches in late February 2015.

Secure View 4 will include industry first ACCE (Advanced Cross Case Examination) analytics allowing users to probe old cases with new data. SV4 will also include new deleted data features, an all new interface and a redesigned analytics engine. For a trial version of Secure View 3, contact: jkirby@susteen.com

Free Webcasts Available to Become Certified as a Digital Forensics Expert

Monday, January 26, 2015 (13:44:22)
(ISC)2® offers the Certified Cyber Forensics Professional (CCFP), the only global cyber forensics credential that provides a comprehensive validation of a candidate’s knowledge and skills as a digital forensics expert. Free CCFP Webcasts are now available that provide insight into what candidates need to know before taking this exam. It includes a detailed overview of each domain, the value of certification, and how to study for the exam

First introduced in 2013, CCFP provides the industry’s first global standard for assessing experienced digital forensics professionals’ mastery and professionalism. The credential provides digital forensics employers and the legal community with validation that a digital forensics professional can lead digital investigations that assure complete, accurate, and reliable results.
  • Posted by: (ISC)2
  • Topic: News
  • Score: 0 / 5
  • (1459 reads)

Magnet Forensics presents: IEF User Summit @ Techno Security

Monday, January 26, 2015 (10:42:14)
Registration Opening Soon!

Join us for Magnet Forensics’ first-ever IEF User Summit at the 2015 Techno Security & Forensics Investigations Conference. Internet Evidence Finder users, and digital forensics professionals considering adding IEF to their toolkit, will learn how to use the software to its full potential to overcome key challenges in computer and mobile forensics. The program will include a mix of lectures and lab sessions led by Jad Saliba and Magnet Forensics’ team of digital forensics experts. If you’re attending Techno Security, extend your stay and join us for this no-cost event!

WHEN:
Wednesday, June 3 to Thursday, June 4 (immediately following Techno Security)

WHERE:
Myrtle Beach Marriott Resort & Spa at Grande Dunes
8400 Costa Verde Drive
Myrtle Beach, SC 29572

Read More (Magnet Forensics)

Webinar (recording): Investigating Sexual Crimes in the Tinder Age

Thursday, January 22, 2015 (15:24:00)
A recording of last month's webinar "Investigating Sexual Crimes in the Tinder Age" is now available online here.

Description:

The usage of location-based mobile dating applications like Tinder and Grindr has exploded over the last year. This new class of mobile app allows singles to identify, chat with, and meet other singles located in their immediate vicinity. As the popularity of these apps continues to grow, they will become increasingly important sources of evidence for digital forensics examiners.

Join Jad Saliba and Jamie McQuaid from Magnet Forensics as they explore what you need to know about finding and analyzing evidence from this new class of mobile dating application using a real-world case scenario...

View Webinar
  • Posted by: jamie
  • Topic: News
  • Score: 0 / 5
  • (1258 reads)

Introducing HddSurgery - Tools for Data Recovery Specialists

Wednesday, January 21, 2015 (15:26:33)
HddSurgery is an innovative young technology company devoted to building professional hard disk data recovery tools. The company was founded in 2009 in Belgrade, Serbia by experienced data recovery experts from Helpdisc Data recovery company.

HddSurgery cover all steps in physical data recovery operation and provide best equipment that will help data recovery and computer forensics companies to improve their clean room techniques and data recovery processes.