±Forensic Focus Partners

Become an advertising partner

±Your Account


Forgotten password/username?

Site Members:

New Today: 0 Overall: 32595
New Yesterday: 0 Visitors: 137

±Follow Forensic Focus

Forensic Focus Facebook PageForensic Focus on TwitterForensic Focus LinkedIn GroupForensic Focus YouTube Channel

RSS feeds: News Forums Articles

±Latest Articles

RSS Feed Widget

±Latest Webinars

Page 3

Released Today: XRY v7.4, Kiosk 7.4 And XEC Express

Thursday, July 06, 2017 (12:17:05)
XRY v7.4 enables extraction of location data from drones, and brings you a significant increase in data recovery with the new Android exploit.

Interview With Ashley Hernandez, Director Of Product Management, Guidance

Wednesday, July 05, 2017 (12:46:05)
First of all, when did you start in this field?

I started in the field of computer forensics when I was in college. But I started with Guidance about 13 years ago, in 2003. I’ve had many roles at Guidance. I started out actually in quality assurance, and then I worked in project management and training.

Can you tell us about the new products that Guidance has recently released?

Yeah, so we announced a couple of products – one is EnCase Mobile Investigator. EnCase Mobile Investigator is available for pre-sell, but it’s going to be available to Forensic customers and Endpoint Investigator customers. It’s really designed to review mobile acquisitions.

Read More
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (1036 reads)

The Future Of ENF Systems

Tuesday, July 04, 2017 (12:37:19)
by James Zjalic

The subject of authentication is important across the entire digital forensic field and we as examiners have various weapons at our disposal in which to defend against the onslaught of manipulators, liars and charlatans. Authentication is frequently amongst the first steps in creating a robust chain of custody for evidence received and can also be an investigation in and of itself. In no field is this more evident than that of audio forensics, where the ubiquitous rise in consumer audio software has caused the proliferation of attempts at the removal or editing of digital evidence.

There are various techniques within audio forensics to authenticate a recording and many are borrowed from areas such as computer and image forensics. One method that is individual to audio forensics is that of ENF or Electric Network Frequency, or as sound engineers like to refer to it: ‘hum’.

Read More
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (1104 reads)

Interview With Paul Shomo, Senior Technical Manager, Guidance Software

Monday, July 03, 2017 (14:42:08)
Tell us a bit about your role and what a typical day in your life looks like.

In 2006 Guidance had this new product research team that I was recruited into that was doing forward thinking research, new product launches, and they were just releasing the first incident response products, then they just did security alerts from sims, and then automated forensic response. So I ended up in there, and then I went on to manage and then architect cyber-security and forensic products for about eight years. Now I work with a lot of partners, scouting technology we can license into our product line. And I do a lot of writing. I’m a Dark Reading contributor and I’ve published recently in Security Week. So that’s my deal. That’s my background.

Read More
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (1069 reads)

Flash Recovery Images To More Than 650 Samsung Devices With Magnet AXIOM

Friday, June 30, 2017 (14:50:57)
Magnet AXIOM 1.1.2 is now available — bringing with it enhanced integration with Griffeye and Project VIC, as well as significant developments in mobile acquisition, Portable Case, and BitLocker decryption.

Enhanced Integration with Griffeye and Project VIC
As we recently announced, AXIOM 1.1.2 will feature deeper integration with Griffeye and Project VIC for enhanced digital forensics analysis in child exploitation cases.

Oxygen Forensics Offers Enhanced Apps Analysis With SQL Queries

Thursday, June 29, 2017 (13:45:47)
With the 6.3 million apps available to a user and only ~ 400 apps fully decoded by any advanced mobile forensic solution, Oxygen Forensics had to come up with a solution that can help the examiner to parse and analyze any application using an SQLite database as a storage file. Understanding that many apps have multiple databases that are all interconnected via relationships, the software now allows the examiner to open and connect multiple databases in one view! Therefore, not only can links be made between a single database and its primary/foreign key relationships Oxygen can do this between database files.

Does a user need to know SQL? NO, Oxygen Forensic Detective builds SQL commands on the fly by just drag and drop. Now, experts can create their own SQL queries for any app in a few simple clicks. Better yet, they can save the query into their library for use if they run into the app in another extraction.

Therefore, no longer do the examiners have to wait for the development of a custom app parse by a software company. They can quickly and easily build their own with our SQLite Viewer and the SQL Visual Query Builder.

An Introduction To Challenges In Digital Forensics

Thursday, June 29, 2017 (12:24:17)
by Chirath Dealwis

Digital forensics is a technique in the identification of computer based crimes. But digital forensics faces a few major challenges when it comes to conducting investigations.

According to Fahdi, Clarke & Furnell (2013), th challenges of digital forensics can be categorized into three parts.

• Technical challenges – e.g. differing media formats, encryption, steganography, anti-forensics, live acquisition and analysis.
• Legal challenges – e.g. jurisdictional issues, privacy issues and a lack of standardized international legislation.
• Resource challenges – e.g. volume of data, time taken to acquire and analyze forensic media.

Read More
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (1290 reads)

Interview With Lesley Carhart, DFIR & OSINT Consultant

Wednesday, June 28, 2017 (13:57:55)
Can you tell us something about your background and why you decided to work in this field?

Sure. My background is a little unusual. I started coding when I was about seven, and I got my first job as professional programmer when I was 15.

I was of course very involved at the time in the Chicago hacker community, and that’s kind of how I learned about digital forensics, when it was a new field, and that it was something that I was really interested in doing.

Read More
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (1320 reads)

Interview With Edewede Oriwoh, Independent Cyber-Physical Security Researcher

Tuesday, June 27, 2017 (12:20:57)
Edewede, you spent some time as a post-doctoral researcher at the University of Bedfordshire. What was your area of study, and what first sparked your interest in it?

My research involved investigating security threats in Smart Homes (SH) and developing an anomaly detection framework and a presence detection model for Smart Homes. It was clear in the early stages of my research that security was (and this is sometimes the case with major technological developments) not quite prominent in discussions and developments around the IoT. In recognition of the importance of the security within SH, I developed the concept of a Cyber-physically secure “Happy Home” which is a baseline security model in which all the elements in a SH are at their most secure state. These elements are a set of attributes (or features) which can be used to build a “Happy Home” - or the equivalent for any other Cyber-physical environment. Deviations from this baseline can be used to identify anomalies in the overall SH system.

Read More
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (1033 reads)

RAM Forensic Analysis

Monday, June 26, 2017 (14:25:40)
by Eliézer Pereira

1 Goal

The purpose of this article is show how to perform a RAM memory forensic analysis, presenting some examples of information that can be retrieved and analyzed to help identify indications of security incidents as well as fraud and other illegal practices through information systems.

2 Good Practices and Techniques for Computer Forensic Analysis

2.1 NIST 800-86

The National Institute of Standards and Technology (NIST) is known worldwide for the publication of documents that bring well detailed and well comprehensive technology standards.

Document 800-86 – Guide to Integrating Forensic Techniques into Incident Response has a number of recommendations for proceeding with forensic analysis of security incidents, from data collection to the preparation of a final report.

Read More
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (1186 reads)