±Forensic Focus Partners

Become an advertising partner

±Your Account


Username
Password

Forgotten password/username?

Site Members:

New Today: 0 Overall: 35390
New Yesterday: 0 Visitors: 173

±Follow Forensic Focus

Forensic Focus Facebook PageForensic Focus on TwitterForensic Focus LinkedIn GroupForensic Focus YouTube Channel

RSS feeds: News Forums Articles

±Latest Articles

±Latest Webinars

Page 2

Search on This Topic: News

[ Go to Home | Select a New Topic ]

Upcoming Webinar: Face Recognition in Analyze DI Pro

Thursday, April 11, 2019 (10:06:35)
Date: April 25, 2019
Time: 3 pm CEST (9 am EST)
Registration: Click here

Join us for this highly anticipated webinar and learn about one of Griffeye’s most advanced and appreciated technologies: Face Recognition in Analyze DI Pro.

When dealing with millions of images and thousands of hours of film, it is almost impossible for humans to pick out and correlate faces. This is where technology comes to the rescue.

Windows Registry Analysis 101

Friday, April 05, 2019 (06:43:26)
by Chirath De Alwis

Computer forensics is the process of methodically examining computer media (hard disks, diskettes, tapes, etc.) for evidence. When considering computer forensics, registry forensics plays a huge role because of the amount of the data that is stored on the registry and the importance of the stored data. The extraction of this data is therefore highly important when investigating. Due to the limitation of tools that can extract forensically valuable data from registry files, investigators have to extract it manually. Because of the registry file format (.REG), extracting information is a challenging task for investigators. Registry files normally store data under unique values called “Keys”. One challenge that investigators must face is the lack of knowledge about Registry Keys and the data which stored under those Keys. This article provide an overview of registry file acquisition, registry structure and common issues in registry analysis.

Read More
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (7782 reads)

UK Police Forces Select HancomGMD Mobile Forensics Solution For Their Needs

Thursday, April 04, 2019 (08:59:34)
HancomGMD has secured a contract to supply its forensic solution to investigation agencies in the UK, an affiliate of Hancom Group said Monday.

The company said it signed a contract with the West Midlands Counter Terrorism Unit and Leicestershire Police in the UK to provide its MD-NEXT and MD-RED.
  • Posted by: YJOH
  • Topic: News
  • Score: 0 / 5
  • (7935 reads)

Techno Security And Digital Forensics Conference CA 2019 – Recap

Thursday, April 04, 2019 (07:49:11)
by Mattia Epifani

The Techno Security and Forensics CA conference took place between 11th and 13th March at The Hilton Torrey Pines in La Jolla (San Diego). More than 200 attendees were present, coming from different fields like digital forensics, e-discovery, incident response and cybersecurity. Most of the attendees were from the U.S. but many people from Canada and Europe were also present.

Forensic Focus was present for the entire conference and documented it in real-time on Twitter. The conference had four different tracks (Forensics, Audit/Risk Management, Information Security and Investigation) and more than 75 talks took place there.

Read More
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (904 reads)

Oxygen Forensics Launches Industry Exclusive Drone Update

Wednesday, April 03, 2019 (11:47:30)
Oxygen Forensics today becomes the sole company in the industry to offer complete flight history extraction from my MyParrot cloud with the release of Oxygen Forensic Detective (11.3).

Career Paths In Digital Forensics

Wednesday, April 03, 2019 (09:12:05)
by Christa Miller, Forensic Focus

In the 30 or so years since the advent of personal computers made digital forensics a viable career path, the profession has matured to the extent of making multiple career paths possible. Now, professionals who are interested in digital forensics have options that range from law enforcement and government investigations, to corporate and self-employed consulting — and often switch between tracks.

Of course, having so many options means that forensic professionals have to be intentional about setting and following their course. The field continues to evolve, so new options may make themselves available in the short or long terms.

Read More
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (7517 reads)

Passware Kit 2019 v2 Released: Extracts Data From iCloud Keychain & LastPass

Wednesday, April 03, 2019 (08:01:57)
What's New

  • Extraction of iCloud keychain records
  • Export and import of password recovery state
  • Password recovery for LastPass databases
  • Passwords extraction from 1Password databases
  • Instant decryption of VeraCrypt volumes for Linux
  • Password recovery for LUKS: support for an additional encryption type
  • Improved support for Amazon Elastic Compute Cloud

CGC Monitor: A Vetting System For The DARPA Cyber Grand Challenge

Monday, April 01, 2019 (11:05:01)
Michael Thompson and Timothy Vidas discuss their work at DFRWS US 2018.

Joe: So, here we have Michael and Tim, who will be talking about their paper, ‘CGC Monitor: A Vetting System for the DARPA Cyber Grand Challenge’.

Timothy: Hi. Thanks for sticking around for the last paper, presentation, [anyway], looks like a few more people have trickled in since breakfast. I’m Tim and this is Mike. And we both worked on the DARPA Cyber Grand Challenge program for about three years. And that concluded just under two years ago now, and the DEF CON conference in Las Vegas. So, we wanted to … it took a little bit to get through all of the disclosure and vetting and [01:01] processes for getting information out from the project, as is sometimes the case with government work. But we wanted to talk about a little piece of the integrity system that was forensically … doing some forensics on the submissions from the competitors.
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (8250 reads)

Find More Evidence That Matters With Magnet AXIOM 3.0

Friday, March 29, 2019 (13:48:50)
We’re excited to release the most powerful and comprehensive version of Magnet AXIOM: Magnet AXIOM 3.0. With AXIOM 3.0, we’re giving you the ability to recover digital evidence from more sources than ever before (including Mac computers and new cloud sources), a powerful and intuitive new Timeline view, and much more.

Using The Content-Length Header Field In Email Forensics

Friday, March 29, 2019 (11:06:55)
by Arman Gungor

As forensic examiners, we often have to analyze emails in isolation without the benefit of server metadata, neighbor messages, or data from other sources such as workstations. When authenticating an email in isolation, every detail counts—we review a long list of data points such as formatting discrepancies within the message body, dates hidden in MIME boundary delimiters, and header fields.

One data point I often see being overlooked is the Content-Length header field. The value this field contains can be leveraged for a simple but powerful check to verify an email’s payload. In this post, I will discuss how we need to preserve emails to be able to utilize the Content-Length header field, how to utilize the data in this field, and a couple of use case scenarios. Let’s start by defining Content-Length.

Read More
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (9090 reads)