±Forensic Focus Partners

Become an advertising partner

±Your Account


Forgotten password/username?

Site Members:

New Today: 0 Overall: 34471
New Yesterday: 8 Visitors: 133

±Follow Forensic Focus

Forensic Focus Facebook PageForensic Focus on TwitterForensic Focus LinkedIn GroupForensic Focus YouTube Channel

RSS feeds: News Forums Articles

±Latest Articles

RSS Feed Widget

±Latest Webinars

Latest Forum Posts

 Topics   Replies   Author   Views   Last Post 
  Outlook Email SQLite DB files from APFS formated MacBook 0 UnallocatedClusters 49   Thu Sep 20, 2018 11:25 pm 
  Samsung Galaxy J5 SM-J500H Bypass 2 Thomass30 103   Thu Sep 20, 2018 8:48 pm 
  Combine/Concatenate video clips that overlaps recording. 2 dpathan 291   Thu Sep 20, 2018 6:31 pm 
  cellebrite mobile forensics solution 0 azz5 113   Thu Sep 20, 2018 5:21 pm 
  Always Possible to Recover Data From Hard Drive? 11 mwatmn 1233   Thu Sep 20, 2018 4:51 pm 

Review Of BlackLight From BlackBag

Thursday, September 20, 2018 (14:49:46)
by Scar de Courcier

In recent months there have been several new and exciting developments to BlackBag’s BlackLight solution. BlackLight helps investigators to analyse computer volumes and mobile devices; it can acquire Android and iPhone devices and runs on Mac or Windows. We took a look at some of the latest changes and how they work.

Read More
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (202 reads)

Job Vacancy: MI5 - Covert Technical Operations Specialist

Wednesday, September 19, 2018 (16:35:57)
Major disruptions ahead for terrorists.

At MI5, we help to keep the country safe. Our talented teams work against ever-evolving threats, from terrorism to espionage. In Covert Technical Operations, our specialists disrupt the work of potential terrorists. Leading on high-profile cases, they use technical capabilities to collect vital intelligence. And now we’re looking for more forward-thinking individuals to join us.

Working within legal frameworks, you’ll find innovative ways to gain access to computers and devices that belong to suspected terrorists. You’ll learn to quickly solve technical problems in tactical, covert and creative ways - providing unique insights into the threats we face. You’ll come to understand the risks posed by particular individuals and groups. Working collaboratively with other investigators, teams and intelligence agencies, you’ll be required to explain complex topics to a non-technical audience, making sure everyone has a good understanding of your work.

Read More
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (333 reads)

Word Forensic Analysis And Compound File Binary Format

Tuesday, September 18, 2018 (15:14:37)
by Arman Gungor

Microsoft Word forensic analysis is something digital forensic investigators do quite often for document authentication. Because of the great popularity of Microsoft Office, many important business documents such as contracts and memoranda are created using Word. When things go south, some of these documents become key evidence and subject to forensic authentication.

My goal in this article is to review a sample Word document in Word Binary File Format, take a look at the underlying data in Compound File Binary (CFB) file format and see what we can find out beyond what mainstream tools show us.

I chose a sample in Word Binary Format (i.e., .doc) rather than in Word Extensions to the Office Open XML File Format (i.e., .docx) because many other file types in the Microsoft universe, such as MSG files, are also based on the CFB file format. I consider CFB to be a treasure trove of forensic artifacts.

Read More
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (447 reads)

Webinar: Fraud, IP Theft, And An Intrusion - A Case Study

Tuesday, September 18, 2018 (14:33:14)
When you’re faced with an intrusion — whether you were brought in as an outside consultant or are responsible for incident response for your organization — your stakeholders or management ask the same question: What did they take, and how did they get in?

In order to answer these questions, examiners must correlate a lot of different data. From the primary source files of interest, to system and network logs, to supporting artifacts that indicate user and file activity, there is a lot of data to go through and having a sound process and reliable tools can help answer these questions.

In this webinar, Nathan Little, Gillware Digital Forensics and Jamie McQuaid, Magnet Forensics will use a real case to demonstrate how Magnet AXIOM can be used to help identify the source of an intrusion and what sensitive data was taken by the attackers.

Join us for this live webinar where you’ll not only be able to learn more about how you can get all this information using AXIOM, but you can ask the experts questions during a live Q&A.

Presenters: Nathan Little, Gillware Digital Forensics and Jamie McQuaid, Magnet Forensics

Tuesday, September 25th @ 1:00PM EDT
Register here

Wednesday, September 26th @ 9:00AM EDT
Register here
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (612 reads)

Interview With Kevin Fisher, Senior Support Engineer, Paraben

Monday, September 17, 2018 (15:54:54)
Kevin, tell us a bit about yourself. What's your background, and how did you become interested in digital forensics?

I have always been a person with interest in electronics (hardware) taking apart and fixing TVs, CB Radios, VCRs and the like. I went back to school at the age of 41, and received my degree in computer science, technology, networking and securities.

I have always had an interest in law enforcement and wanted to be a police officer, following in my father’s footsteps so to speak. My dad was a deputy sheriff for Lincoln County in Montana. Digital forensics is the logical step between these two areas so I took it.

Read More
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (455 reads)

Register For Webinar: Targeted Search On Live Remote Systems With AD Enterprise

Friday, September 14, 2018 (15:10:26)
AD Enterprise 6.5 introduced new, enhanced targeted search capabilities on live remote systems. Come join us for a short introduction to the new ability. Use it to search and preview data including keywords, hash values, email, security events, etc. These capabilities can be used for any event from post-breach analysis and threat hunting, to searching for unauthorized data and file content.

Presenter: Steve Sunday, Senior Sales Engineer, AccessData

Date / Time: Friday September 21, 8:00am PST

Register here
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (608 reads)

Big Improvements Make Magnet AXIOM 2.5 The Fastest Version Yet

Friday, September 14, 2018 (12:44:52)
Magnet Forensics has been working hard to make sure that that the day-to-day experience of using Magnet AXIOM is improving all the time. With the latest version of Magnet AXIOM, Magnet AXIOM 2.5, we’re continuing to build on the huge features we’ve brought in with AXIOM 2.0. We know that differences of hours — or even minutes — can be crucial in an investigation and we’ve been busy ensuring that working the case takes less time than ever.

Database of Software “Fingerprints” Expands to Include Computer Games

Thursday, September 13, 2018 (15:58:34)
by Richard Press, NIST

One of the largest software libraries in the world just grew larger. The National Software Reference Library (NSRL), which archives copies of the world’s most widely installed software titles, has expanded to include computer game software from three popular PC gaming distribution platforms—Steam, Origin and Blizzard.

The NSRL, which is maintained by computer scientists at the National Institute of Standards and Technology (NIST), allows cybersecurity and forensics experts to keep track of the immense and ever-growing volume of software on the world’s computers, mobile phones and other digital devices. It is the largest publicly known collection of its kind in the world.

Read More
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (908 reads)

Review Of Analyze DI Pro From Griffeye

Tuesday, September 11, 2018 (16:24:41)
by Scar de Courcier, Forensic Focus

Griffeye Analyze sprung from a need for better triage and decreased investigator stress in child exploitation investigations. Specialising in visual media, the idea is to increase workflow whilst decreasing the level of exposure for analysts.

Although the idea was born from experience in child exploitation, and this was also the use case for this review, Analyze DI Pro can of course be used across a range of cases for triage, similarity matching and more.

Read More
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (751 reads)

Acquire Mobile Forensic Evidence In Minutes... Not Hours

Tuesday, September 11, 2018 (14:26:01)
Susteen's new Data Pilot 10 Field Acquisition Device: For the first time ever, while in the field, you can easily access and retrieve data from phones in minutes, while quickly searching for known keywords and lists. Full reporting features, help agents in the field, make quick real-time decisions.

This device is user friendly and the acquired data is compatible with other digital forensic tools you already have back at the lab.

Affordable to all types of LE agencies, and Introductory pricing is available for a "limited time" so please click here to get a quote today and reserve your devices. Want an on-site demonstration? Contact Us today!