±Forensic Focus Partners

Become an advertising partner

±Your Account


Username
Password

Forgotten password/username?

Site Members:

New Today: 1 Overall: 32897
New Yesterday: 3 Visitors: 158

±Follow Forensic Focus

Forensic Focus Facebook PageForensic Focus on TwitterForensic Focus LinkedIn GroupForensic Focus YouTube Channel

RSS feeds: News Forums Articles

±Latest Articles

RSS Feed Widget

±Latest Webinars

Latest Forum Posts

 
 Topics   Replies   Author   Views   Last Post 
  Drone forensics 0 XRY_MSAB 30   Wed Oct 18, 2017 5:59 pm 
XRY_MSAB
  How can we decrypt and export Whastapp database (Android 7) 3 killikli 405   Wed Oct 18, 2017 12:59 pm 
jasonlee
  NIV Networked Intelligent Vehicles 2 RolfGutmann 373   Tue Oct 17, 2017 8:04 pm 
Babushka
  Import of Oxygen Physical Image into Autopsy 0 Rcady 197   Tue Oct 17, 2017 6:31 pm 
Rcady
  CLOSED - Interview Stage - Evidence Team Member (see thread) 1 shep47 1632   Tue Oct 17, 2017 3:11 pm 
shep47

Three Things You Need To Know About EnCase Mobile Investigator

Wednesday, October 18, 2017 (14:55:42)
Guidance Software (Now OpenText) has recently released EnCase® Forensic and EnCase Endpoint Investigator 8.05 supporting mobile device acquisitions in addition to the all-new EnCase Mobile Investigator, which offers powerful mobile data review and reporting capabilities for acquired mobile data.

Working with the forensic community, we developed EnCase Mobile Investigator with the needs of examiners in mind. Our new mobile forensics solution delivers the same level of visibility to mobile devices as delivered to traditional endpoints through EnCase Forensic. With continuous updates to mobile operating systems and popular apps, the broadest mobile device support available, and powerful investigation features, EnCase Mobile Investigator stands out from the pack — empowering examiners to find, analyze, and report on the evidence they need to close cases.

Why You Need Forensics In An IoT World

Wednesday, October 18, 2017 (12:20:58)
We live in a truly digital age. The Internet of Things (IoT) is at the forefront of almost everything we touch as consumers. From the Amazon Echo to smart door locks, we are integrating IoT devices into daily life. However, users often don’t realize how much data these devices collect and store.

The IoT is also fuelling a frenetic pace for new and changing technology. The evolution of a cell phone from the first models in the 1990’s to today’s iPhone x took 20 years. On the other hand, IoT technology is changing much more quickly. With more devices connected than ever – according to Gartner, we will hit 20 billion IoT devices by 2020 – the digital forensic community faces several unique questions:

MOBILedit 4.2 Supports New Apple HEIF Photo Format, Improves Cell Tower Data

Wednesday, October 18, 2017 (10:08:11)
Latest release of MOBILedit Forensic Express brings many great additions including support of iOS 11 and Apple's new photo format HEIF, Android user dictionary analysis, determine Android clock/time-zone manipulation, and improved deleted data and cell tower data retrieval. In 4.2 we've also improved Android call log analysis and the MTK chipset hack for physical acquisition. Many apps have been added or updated and we've improved direct viewing of video message attachments.

Forensic Focus Forum Round-Up

Tuesday, October 17, 2017 (11:56:22)
Welcome to this month’s round-up of recent posts to the Forensic Focus forums.

Apple have announced a new file system - share your thoughts on the forum.

Are these encrypted files, and if so, how would you access them?

Forum members discuss last written times on MountPoints2.

What do you think of balloon powered internet? Chime in on the forum.

Can you help marcyu to decrypt Microsoft Word 2003 40-bit encryption?
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (646 reads)

Free Live Webinars Of Our Most Requested AccessData Training Sessions

Monday, October 16, 2017 (15:39:34)
AccessData is offering a series of live training webinars based on some of our most popular sessions of the recent past. Our trainers have 30 years of experience in delivering superior training and certifications for digital forensics and legal e-discovery. Your seat is free, so register soon—they won't last long!

http://marketing.accessdata.com/bydemandwebinars

Linux Memory Forensics: Dissecting the User Space Process Heap

Monday, October 16, 2017 (12:45:20)
by Frank Block and Andreas Dewald

The analysis of memory during a forensic investigation is often an important step to reconstruct events. While prior work in this field has mostly concentrated on information residing in the kernel space (process lists, network connections, and so on) and in particular on the Microsoft Windows operating system, this work focuses on Linux user space processes as they might also contain valuable information for an investigation. Because a lot of process data is located in the heap, this work in the first place concentrates on the analysis of Glibc’s heap implementation and on how and where heap related information is stored in the virtual memory of Linux processes that use the Glibc heap implementation. Up to now, the heap was mostly considered a large cohesive memory region from a memory forensics perspective, making it rather hard manual work to identify relevant information inside.

Read More
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (349 reads)

Focused Digital Forensic Methodology

Friday, October 13, 2017 (11:38:54)
by Haider H. Khaleel

Since the end of the 19th Century until the current time, law enforcement has been facing a rapid increase in computer-related crimes. In the present time, digital forensics has become an important aspect of not only law enforcement investigations, but also; counter-terrorism investigations, civil litigations, and investigating cyber-incidents. Due to rapid developing and evolving technology, these types of forensic investigations can become complex and intricate. However, creating a general framework for digital forensic professionals to follow during those investigations would lead to a successful retrieval of relevant digital evidence.

The digital forensic framework or methodologies should be able to highlight all the proper phases that a digital forensic investigation would endure to ensure accurate and reliable results. One of the challenges that digital forensic professionals have been facing in the recent years is the volume of data submitted for analysis.

Read More
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (508 reads)

Video: Bit Errors As A Source Of Information In Nand Flash MemoryBit Errors

Thursday, October 12, 2017 (08:50:23)
This year at DFRWS EU, Jan Peter van Zandwijk from the Netherlands Forensic Institute presented research into bit-errors.

Take a look at the video and the full transcript here.
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (489 reads)

Interview With Cinthya Grajeda Mendez, University Of New Haven

Wednesday, October 11, 2017 (11:05:17)
Cinthya, tell us a bit about yourself. What's your role, and what does a day in your life look like?

I am a U.S. Army veteran. I recently fulfilled one of my biggest achievements, which was being awarded a Bachelor’s degree in Cyber Systems from the University of New Haven and now, I am working on my Master’s degree in the same field. Thus, my days a are a little busy since I’m a full-time graduate student.

I also work for the Cyber Forensics Research and Education Group (www.UNHcFREG.com) conducting research and administering a digital forensics platform known as the Artifact Genome Project (AGP).

Read More
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (483 reads)

Interview With Jan-Niclas Hilgert, Research Assistant, Fraunhofer FKIE

Tuesday, October 10, 2017 (08:44:04)
Jan, tell us a bit about yourself. What's your role, and what does a typical day in your life look like?

Well, I am a research assistant of the Cyber Analysis & Defense department of the Fraunhofer FKIE in Bonn, Germany. We are doing a lot of research in the area of malware and firmware analysis, but also digital forensics. So this is currently also my research topic, especially file system forensics.

Besides working on my own research, we are doing a lot of teaching with the University of Bonn and are working closely together with federal agencies for other projects.

Read More
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (501 reads)