±Forensic Focus Partners

Become an advertising partner

±Your Account


Username
Password

Forgotten password/username?

Site Members:

New Today: 0 Overall: 36296
New Yesterday: 0 Visitors: 121

±Follow Forensic Focus

Forensic Focus Facebook PageForensic Focus on TwitterForensic Focus LinkedIn GroupForensic Focus YouTube Channel

RSS feeds: News Forums Articles

±Latest Articles

±Latest Videos

±Latest Jobs

Digital Forensics, Computer Forensics, eDiscovery

How To Easily And Accurately Play CCTV With Amped Replay

Friday, December 06, 2019 (18:53:45)
by Blake Sawyer, Amped Software

For Law Enforcement across the world, one of the biggest hindrances to actionable evidence comes from CCTV. There are sites devoted to providing codecs, of which there are hundreds, and IT departments that spend most of their time managing the many players from each DVR manufacturer. In my old casework, I would handle close to 80-90 video requests a month, most of the time coming from proprietary CCTV video. One tool that helped me as a full-time video examiner was Amped FIVE. Through daily use, we were able to get images and video clarified and out to the officers and media, as well as keep our backlog at a minimum.

Read More
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (476 reads)

Analysis Of Jump Lists With Belkasoft Evidence Center

Friday, December 06, 2019 (13:26:10)
Jump Lists are an artifact of the Windows OS. It first emerged in Windows 7: this artifact has been present in all the subsequent versions of the Windows OS ever since.

MSAB Releases New Versions Of XRY, XAMN And XEC

Thursday, December 05, 2019 (12:16:46)
Now released: XRY 8.2, XAMN 4.5 and XEC 5.3

The new releases of XRY, XAMN and XEC introduce a range of new and improved capabilities, with a strong focus on making it faster and easier than ever for examiners and investigators to preview, extract and analyze data from mobile devices and apps.

Highlights of the newest releases are summarized below, and, as always, we highly recommend that all current customers download the Release Notes from the Customer Portal for a complete description of all updated product capabilities and supported devices and apps.

Try XRY free for 30 days

Learn more about the MSAB solutions

Deleted File Fragment Dating By Analysis Of Allocated Neighbors

Thursday, December 05, 2019 (12:02:06)
Ahmed Bajat shares his research at DFRWS EU 2018.

Ahmed: Thank you. My name is Ahmed Bahjat, I am here from George Mason University - shoutout to Jessica Hyde. I'll be talking about file fragments dating; this is probably your first time hearing about dating on this forensics theme.

It's actually adopted from the archaeology field. They have two types of dating: they have relative dating and they have absolute dating. Relative dating is where you pinpoint an age for an artifact, or absolute dating where they put a timestamp on a date. So I'll be talking about this, and our efforts at George Mason to realise this.

Read More
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (548 reads)

Digital Forensic Techniques To Investigate Password Managers

Wednesday, December 04, 2019 (12:23:01)
by Dr Tristan Jenkinson

In part one we discussed the importance that data from password managers can play. In part two, we look at aspects an investigation may include from a digital forensics perspective.

Finding evidence that a password management tool has been in use could be an important step. It could lead to a request for the relevant details to access the content, or could be used to demonstrate a previous failure to provide details under court order or as part of an agreement. Having an indication of when the manager was installed, how often it was used and when it was last used could be helpful if the usage is questioned.

Read More
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (470 reads)

Password Trends 2019

Wednesday, December 04, 2019 (12:03:59)
The Passware team has analyzed over 4 billion real user passwords and gathered data on the latest trends on password use.

ABOUT THE RESEARCH

As sources of passwords, we have merged leaked passwords databases available over the internet, passwords recovered by our software, and passwords uploaded to our Password Exchange server into a single database. In total, the database contains over 4 billion passwords. We have removed duplicates and invalid records, and we are now happy to share this database with our customers so that they can leverage it as a dictionary in their password recovery processes! The dictionary consists of 3.2 billion real passwords, and it is 8.4 GB in size. This is 30% more than our previous proprietary leaked passwords dictionary, compiled in 2018.

Amped Replay: Giving Police Investigators The Tools To Close More Cases

Wednesday, December 04, 2019 (11:58:33)
In this webinar, Amped Software's trainer Blake Sawyer will walk you through a session of case examples on how police officers around the world are seeing the benefits of Amped Replay in their case workflows to progress with their investigations.

What you will learn in this webinar:

• How police investigators can quickly convert and play videos from proprietary CCTV/DVR formats, body worn, dash cam, mobile phones, covert video, drones and social media
• How quick and easy it is to export still images and video clips
• How to generate an easy to understand scientific report
• How to redact and annotate images to send to the media for identification or public appeals
• How providing officers with the proper tools can reduce delays in investigations and cut down backlogs in the video units

Date and time: December 10, 3:00 PM CET / 9:00 AM EST

Presenter: Blake Sawyer

Register here
  • Posted by: scar
  • Topic: All
  • Score: 0 / 5
  • (628 reads)

Forensic Extraction Of Data From Mobile Apple Devices

Wednesday, December 04, 2019 (11:39:00)
This article examines the fundamentals of a forensic examination covering Apple mobile devices. A step-by-step guide describing the process of forensic data extraction and analysis exemplified by Apple mobile devices (iPhone) will be given below. This article will also familiarize its readers with such special-purpose software used in digital forensics as Belkasoft Acquisition Tool and Belkasoft Evidence Center. It will also show how to utilize them to examine devices of this type.

How To Digital Forensic Boot Scan A Mac With APFS

Tuesday, December 03, 2019 (15:57:16)
by Rich Frawley

In this short 3-minute video, ADF’s digital forensic specialist Rich Frawley shows how to boot a MacBook Air (APFS, non-encrypted) with Digital Evidence Investigator.

The ADF digital forensic team is hard at work putting the finishing touches on the complete package:

Enabling FileVault support at boot
Allowing the input of credentials, much like we currently support digital forensic investigations on Surface Pro computers with Bitlocker

Read More
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (541 reads)

Discover What’s New In OpenText™ Digital Forensic Solutions For Release 16 EP7

Tuesday, December 03, 2019 (15:24:56)

OpenText™ EnCase™ Forensic is a finalist in the SC Magazine Award 2020!

  • Posted by: ssagar
  • Topic: News
  • Score: 0 / 5
  • (807 reads)