±Forensic Focus Partners

Become an advertising partner

±Your Account


Forgotten password/username?

Site Members:

New Today: 2 Overall: 33148
New Yesterday: 2 Visitors: 144

±Follow Forensic Focus

Forensic Focus Facebook PageForensic Focus on TwitterForensic Focus LinkedIn GroupForensic Focus YouTube Channel

RSS feeds: News Forums Articles

±Latest Articles

RSS Feed Widget

±Latest Webinars

Latest Forum Posts

 Topics   Replies   Author   Views   Last Post 
  What happened to SiQuest? 1 Adam10541 210   Mon Dec 11, 2017 1:38 pm 
  Digital Forensic Coordinator - Staffordshire 3 Scoop 220   Mon Dec 11, 2017 1:24 pm 
  Find out if somone have delted files in event log 12 Raider800 1174   Mon Dec 11, 2017 12:44 pm 
  Video Enhancement Software 3 alveylee 622   Mon Dec 11, 2017 11:24 am 
  Digital Forensics Technical Lead - Cambridgeshire 0 seansmyth10 133   Mon Dec 11, 2017 9:58 am 

Evidence Gathering For Network Security And Forensics

Monday, December 11, 2017 (09:58:39)
Dinil Mon Divakaran discusses his research at DFRWS EU 2017.

Divakaran: Good morning, everyone. My name is Dinil Mon Divakaran, and this work is with three other authors – Kar Wai, Ido, and Vrizlynn. We are from the A Star Institute for Infocomm Research. And as has been introduced, [00:25] Evidence Gathering for Network Security and Forensics.

So I think [00:30] takeaways from yesterday’s dinner talk was that [00:37] evidence, right? [00:42] trying to figure out if they can say something with more number of evidences. Before I start, I also would like to say that [00:57] [active borders between security and forensic attributes], kind of similar in many network security and forensic work that at least I am involved in. In the sense that the solution can be used for forensic analysis, can also be used for security analysis, offline, online, and real-time [01:19].

Read the full transcript and watch the video here.
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (147 reads)

Mobilyze 2017 R1.1 Is Now Available

Thursday, December 07, 2017 (10:32:36)
BlackBag Technologies is pleased to announce the release of the latest version of our mobile device triage tool, Mobilyze 2017 R1. New features added to this version of Mobilyze are designed to increase the capabilities of Mobilyze examiners to analyze the latest iOS and Android devices.

Improvements include:
- Support for Apple iOS 11
- Support for Android 8 Oreo
- iPhone 8 identified for full collection and analysis
- iOS 11 encrypted backups and MDM profiles detect and prompt for passwords
- Expanded Emoji support, including from the latest iOS 11.1 release

Learn more about the latest Mobilyze release.

Imaging Locked Motorola Devices Via Bootloader Exploit

Tuesday, December 05, 2017 (12:09:47)
Last-generation Android devices are gradually getting more secure, even approaching iOS-grade security in some usage scenarios. Equipped with fingerprint readers and compulsory encryption of the data partition, Android smartphones became a much tougher acquisition target compared to just a couple of years ago. In this world of increasing security, security firms go out of their way to discover usable techniques for imaging such devices. In this article, we will discuss the latest technique allowing experts to perform bootloader-level imaging and decryption of 2015, 2016 and 2017 Motorola models running Android 5.0 through 7.0.

Bootloader Lock

Before we go on to the new acquisition method, let us first have a look at Android data protection mechanisms. In this article, we’ll concentrate on three things: bootloader lock, encryption, and passcode. Let’s start with bootloader.

Read More
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (754 reads)

Segmented Hashing With Atola Insight Forensic

Monday, December 04, 2017 (10:59:17)
It has been a year since Atola Technology introduced the concept of Segmented hashing, presented the open-source tool Seghash and supported it on its flagship device, Atola Insight Forensic.

While this method of hashing has a number of benefits for forensic specialists, among its strongest advantages is its applicability to damaged drives.
  • Posted by: Yulia
  • Topic: News
  • Score: 0 / 5
  • (826 reads)

Oxygen Forensics Adds 20 New Features To Launch Oxygen Forensic Detective X

Thursday, November 30, 2017 (17:06:05)
Oxygen Forensics, a worldwide developer and provider of advanced forensic data examination tools for mobile devices, drones and cloud services, today announced that it has added almost 20 new features in its flagship product Oxygen Forensic® Detective X (version 10). Among the features, Oxygen has made its industry-leading Oxygen Forensic® Cloud Extractor even faster by using 64-bit database processing power that speeds up the entire data extraction process.

Oxygen Forensic Detective X enhances investigation abilities for forensic experts with the addition of these uniquely supported cloud services:

Mi Cloud - Xiaomi phones are growing in popularity. The Oxygen Forensic Cloud Extractor offers the industry-first ability to extract all available information from Mi Cloud via login/password or token including contacts, calls, messages, calendar and other personal data.
• Samsung Cloud backup - Forensic experts can import and parse complete Samsung Cloud backups that can be accessed via login/password or token. Backups may contain contacts, calls, messages, calendars, files and Wi-Fi history.
Samsung Cloud Gallery – Added the ability to extract live, trashed and deleted photos, videos and documents from Samsung Cloud. This data also contains geographical locations so experts can track the whereabouts of the Samsung device owner.

New Webinar Added To The AccessData Coffee Break Webinar Series

Thursday, November 30, 2017 (12:56:50)
AccessData recently added a webinar to their popular Coffee Break Webinar series—a series of 30-minute “how to” webinars targeted to the end user.

The webinar, How to identify, assess and eliminate risk with AD RTK™ will walk attendees through the features and benefits of one of the newest products from AccessData. AD RTK™ (Risk Toolkit) is a powerful new tool corporations and government agencies can use to combat problematic or sensitive data. It locates potential information risks—very often, authorized data residing in unauthorized locations, such as classified information on an unclassified network—and remediates it across the enterprise. In addition, AD RTK can run scans of thousands of computer endpoints and network share repositories once at a time or it can be scheduled for recurring jobs to ensure ongoing vigilance.

To find out more about this exciting new product, register for the webinar on 19 December 2017.
  • Posted by: hhagene
  • Topic: News
  • Score: 0 / 5
  • (687 reads)

The CSI Effect – Expectations Vs Limitations

Thursday, November 30, 2017 (11:09:10)
by James Zjalic

Much has been written about the CSI phenomenon within digital forensics circles, but is there a way we as experts can reduce this effect, maybe not globally but at least amongst our own clients? In just the last couple of weeks, I’ve had requests to enhance a speaker on the other end of the phone, on a recording in which the voice on the other end of the phone sounded like something you would hear on a cartoon. It had the rhythm of somebody speaking but that’s about all it had going for it. Another request asked to enhance a video recording in which the two individuals were seated at a distance, in a dark room, with sunlight streaming through a window across the camera lens and a lamp in front of one of the individuals faces. A third and final example is being asked to enhance the screen of a mobile phone from pictures of said mobile phone. That shouldn’t be a problem you think. Until you consider the pictures were being taken from distances of over a meter of a phone that was turned away from the camera lens.

Read More
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (661 reads)

Paraben Releases Version 1.5 Of The E3 Platform With New iOS 11 And Chrome

Wednesday, November 29, 2017 (11:27:32)
Breaking the Boundaries of Digital Data

Paraben has released the latest version of the E3 Platform, a universal system for the examination of digital evidence. The E3 Platform was designed to deal with all types of digital evidence from computers to mobiles to the new area of IoT devices. The 1.5 version of the platform includes updates for all the Paraben tools that include features such as:

• Ability to parse Bookmarks data in Chrome and enhancements to Chrome processing.
Mobile Data Acquisition/Parsing Changes:
• The new Mobile Excel Spreadsheet report has been added for E3 mobile cases.
• E3 mobile data cases processing performance has been improved.
• Ability to acquire iOS devices with encrypted backups has been added.
• Detection of Android apps installation source for the most popular stores has been added.
  • Posted by: Shan
  • Topic: News
  • Score: 0 / 5
  • (730 reads)

Interview With Raahat Devender Singh, Research Scholar, Panjab University

Wednesday, November 29, 2017 (10:18:44)
Raahat, tell us a bit about yourself and your background. What does a day in your life look like?

Well, I’m a PhD research scholar, currently working in Panjab University, Chandigarh, India. I’m actually writing my thesis these days! I have an academic background (bachelor's, master's, PhD… the usual).

A typical day in my life consists of research, more research, writing about the research, some more research, and talking to other colleagues about their research (boring… I know!). I do however enjoy several other non-research related pursuits, but I guess I’ll mention those in the response to the final question.

Read More
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (538 reads)

Interview With Jessica Hyde, Director Of Forensics, Magnet

Tuesday, November 28, 2017 (12:57:02)
Jessica, can you introduce yourself and tell us a little about what you do?

Sure. My name is Jessica Hyde. I’m the Director of Forensics at Magnet Forensics, USA. I also am an adjunct professor at George Mason University, where I teach mobile device forensics in the Computer Forensics program.

My background is I started off in the Marine Corps, and I served six years there, discovered that I really liked engineering, went after an engineering degree, and then when I went into the workforce I actually started doing work in a reverse engineering lab, which led to doing mobile forensics, which led to me deciding to study computer forensics and get a Master’s in computer forensics. While I was working in mobile forensics, I was specializing in devices that were damaged, so I was doing chip off and JTAG on almost everything I saw every day. So I really got to do a lot of low-level forensics – parsing, raw hex, and proprietary file systems in the beginning.

Read More
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (654 reads)