±Forensic Focus Partners

Become an advertising partner

±Your Account


Username
Password

Forgotten password/username?

Site Members:

New Today: 2 Overall: 32339
New Yesterday: 8 Visitors: 137

±Follow Forensic Focus

Forensic Focus Facebook PageForensic Focus on TwitterForensic Focus LinkedIn GroupForensic Focus YouTube Channel

RSS feeds: News Forums Articles

±Latest Articles

RSS Feed Widget

±Latest Webinars

Page 2

Forensic Focus Forum Round-Up

Thursday, June 15, 2017 (07:06:15)
Welcome to this month’s round-up of recent posts to the Forensic Focus forums.

Forum members discuss how to recover data from a dead USB stick.

Can you help this new member who has been tasked with setting up a digital forensics team?

How would you find out when a folder or file was hidden?

Forum members discover some problems with memory analysis of Windows 10 machines.

How would you retrieve data from a Microsoft Surface Tablet that’s Bitlocker-encrypted?

Forum members discuss how to delete files.

What do you use to take notes on the examinations you conduct? Share your thoughts in the forum.

Is it possible to delete a photo from Google Image Search results?

Forum members discuss ransomware attacks in hospitals.

Can you help CopyRight to parse the WhatsApp database on a Huawei 6X?

How would you decrypt a Bitlocker-encrypted partition? Chime in on the forum.

Forum members discuss controlling children’s access to the internet.
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (695 reads)

AccessData To Host Digital Forensics Lab At Cybersecurity Camp For Girls

Wednesday, June 14, 2017 (09:10:51)
AccessData Group, a leading provider of integrated digital forensics and e-discovery software, will host hands-on labs to educate students about digital forensics at the 2017 GenCyber: Girls in CybHER Security camp at Dakota State University (DSU).

Review Of Oxygen Forensic Detective From Oxygen Forensics

Tuesday, June 13, 2017 (07:38:19)
Reviewed by Miroslav Klarica, CEO at Detective Agency Mreza, Croatia

The selection of a multifunctional tool for mobile forensics is the key for successful investigation.

Private investigations, no matter if they are about love infidelities, missing persons or asocial behavior of adolescents, today are unimaginable without forensic analysis of mobile devices. I will be more specific, I wouldn't be able to close many of my cases without the help of tools like Oxygen Forensic Detective.

Read More
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (663 reads)

A Method For Verifying Integrity And Authenticating Digital Media

Friday, June 09, 2017 (07:11:05)
by Martin Harran, William Farrelly & Kevin Curran

Due to their massive popularity, image files, especially JPEG, offer high potential as carriers of other information. Much of the work to date on this has focused on steganographic ways of hiding information using least significant bit techniques but we believe that the findings in this project have exposed other ways of doing this. We demonstrate that a digital certificate relating to an image file can be inserted inside that image file along with accompanying metadata containing references to the issuing company. Notwithstanding variations between devices and across operating systems and applications, a JPEG file holds its structure very well. Where changes do take place, this is generally in the metadata area and does not affect the encoded image data which is the heart of the file and the part that needs to be verifiable. References to the issuing company can be inserted into the metadata for the file. There is an advantage of having the digital certificate as an integral part of the file to which it applies and consequently travelling with the file. We ultimately prove that the metadata within a file offers the potential to include data that can be used to prove integrity, authenticity and provenance of the digital content within the file.

Read More
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (768 reads)

Oxygen Forensic Detective 9.4 Goes All In For Android Device Capabilities

Thursday, June 08, 2017 (14:42:57)
Oxygen Forensics, a worldwide developer and provider of advanced forensic data examination tools for mobile devices and cloud services, is going all in on Android devices by adding Samsung cloud extraction capabilities for its flagship product, Oxygen Forensic Detective 9.4, and through a partnership with Passware, Inc. to overcome data encryption on Android devices.

Available today, Oxygen Forensic Detective 9.4 adds support for data extraction from Samsung cloud for all Samsung Galaxy devices allowing experts to extract data from the most popular smartphone brand in the world even if the device is lost or damaged. The added focus on Samsung cloud data extraction allows forensic experts the ability to gain access to account details, device list, contacts, calls, messages, notes and browser data saved on any Samsung Galaxy device.

Magnet Forensics To Offer Enhanced Integration With Project VIC And Griffeye

Wednesday, June 07, 2017 (09:43:27)
Global roadshow will showcase seamless integration of Project VIC data and Griffeye categorization into Magnet AXIOM

Magnet Forensics, a global leader in developing forensic software for smartphone and computer examinations, today announced that Magnet AXIOM, its complete digital investigation platform, will soon feature deeper integration with Griffeye and Project VIC for enhanced digital forensics analysis in child exploitation cases.

AXIOM users will soon be able to quickly add media files that have been categorized in Griffeye directly back into AXIOM for more holistic analysis and reporting. This simplified workflow will save examiners time and effort as they work to analyze and share all findings for the whole case – from categorized media files, to messages, to location and time-stamped data, to system data – with investigative teams.

Interview With Chuck Easttom, Computer Scientist & Consultant

Wednesday, June 07, 2017 (08:39:12)
Chuck, tell us a bit about yourself. What does a day in your life look like?

Well I stay very busy. I am always working on a new book or paper. I travel all over the world consulting and conducting training on a variety of computer security related topics.

You've recently published a paper on how graph theory can be used to model forensic examinations. What is graph theory?

Graph theory is a part of discrete mathematics and it is used to study the relationship between objects. It has been widely used in network optimization.

Read More
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (642 reads)

New White Paper - The Technology Of Child Luring: Can Machine Learning Help?

Wednesday, June 07, 2017 (06:53:49)
Magnet Forensics has a new white paper available that discusses why and how contextual content analysis works, based on a description of what child luring is (and isn’t) and what nuances to expect.

The white paper - The Technology of Child Luring: And How Machine Learning Helps Investigators to Spot it - also covers how machine learning, such as the model introduced with Magnet.AI (our industry-leading technology that analyzes conversations to recover potential child luring content for examiners to consider), overcomes the above challenges using data science.

Download the white paper now!

An Introduction To Theft Of Trade Secrets Investigations

Monday, June 05, 2017 (07:36:35)
by Laurence D. Lieb, Managing Director, HaystackID.

The subjects we will be covering include:

• Defining When One Should Reasonably Panic
• Reasonable Triage Steps to Take in Order to Identify if There is Only Smoke or an Actual Fire
• The Importance of Defining “Win” Upfront and the Avoidance of Mission Creep
• Definition and Identification of trade secrets
• Improper Misappropriation as Defined By 18 U.S.C. § 1839(5) (A) and (6)(B)
• Restrictive Covenants and Departing Employees
• Evidence Mapping and Preservation
• Reasonable Forensic Analysis Steps
• Special Considerations Regarding Smartphone Based Evidence
• Agreed Orders To Address Privacy Concerns
• Reasonable Attorney-Client Communication Security Measures
• Civil Subpoena for Carrier Call and Text Message Records

In the first section, we will define and lay out reasonable steps one can take in the event smoke has begun to appear which could indicate fire.

Read More
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (849 reads)

Challenges Of ISO 17025 Accreditation – Survey Results

Friday, June 02, 2017 (10:26:49)
A group of forensic practitioners has recently conducted a survey into the ISO 17025 scheme – its effectiveness, and its relevance for digital forensics.

The survey was conducted using Google Forms and was aimed at forensic practitioners on the front line of investigation, rather than at managers or corporations. What follows below is a summary of the results.

The majority of the respondents were investigators in law enforcement, followed by those in the private sector. Some of the private sector respondents worked alongside law enforcement on some investigations, while others did not.

Most provided a range of different services, with the most popular being hard disk and storage media imaging; analysis of stored data; phone contents preservation and analysis; server analysis; and network investigations analysis.

Read More
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (832 reads)