±Forensic Focus Partners

Become an advertising partner

±Your Account


Username
Password

Forgotten password/username?

Site Members:

New Today: 1 Overall: 35514
New Yesterday: 4 Visitors: 198

±Follow Forensic Focus

Forensic Focus Facebook PageForensic Focus on TwitterForensic Focus LinkedIn GroupForensic Focus YouTube Channel

RSS feeds: News Forums Articles

±Latest Articles

±Latest Webinars

Page 4

Search on This Topic: News

[ Go to Home | Select a New Topic ]

Now Released: XRY 7.12, XAMN 4.2 And XEC Director 5.0

Monday, April 15, 2019 (14:28:13)
Today, MSAB released new versions of our product suites – XRY, XAMN and XEC – with many significant new and improved capabilities to help investigators, examiners and other users work faster, smarter and more efficiently.

Among the highlights are faster Android extractions and significantly improved Android and iOS app support in XRY, plus a time-saving intelligent free text search function, many user experience improvements and a new export wizard in XAMN. The new version of XEC Director gives supervisors the ability to collect more granular information on user levels for improved management and efficiency.

XRY 7.12 adds support for 342 mobile devices and apps, bringing the total number of supported devices and app profiles to 27,118.

This summarizes additional highlights in each product.

Building Stack Traces From Memory Dump Of Windows x64

Monday, April 15, 2019 (12:10:48)
Yuto Otsuki discusses his research at DFRWS EU 2018.

Yuto: Thank you, chairperson. I am Yuto Otsuki, a researcher at NTT Secure Platform Laboratories in Japan.

Today, I’d like to talk about building stack traces from memory dump of Windows x64. Now, as you know, malware is widely used for various cyberattacks. To fight against such attacks, forensic analysis is a conventional approach. And stack traces play an important role in memory forensics, as well as program debugging. Stack traces become a clue to uncover what malware has actually done on the host. However, unfortunately, traditional techniques don’t work for memory dump of Windows x64 environment.

We propose a new method for building stack traces from such memory dump. I’ll start talking from background.
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (5258 reads)

Upcoming Webinar: Face Recognition in Analyze DI Pro

Thursday, April 11, 2019 (10:06:35)
Date: April 25, 2019
Time: 3 pm CEST (9 am EST)
Registration: Click here

Join us for this highly anticipated webinar and learn about one of Griffeye’s most advanced and appreciated technologies: Face Recognition in Analyze DI Pro.

When dealing with millions of images and thousands of hours of film, it is almost impossible for humans to pick out and correlate faces. This is where technology comes to the rescue.

Windows Registry Analysis 101

Friday, April 05, 2019 (06:43:26)
by Chirath De Alwis

Computer forensics is the process of methodically examining computer media (hard disks, diskettes, tapes, etc.) for evidence. When considering computer forensics, registry forensics plays a huge role because of the amount of the data that is stored on the registry and the importance of the stored data. The extraction of this data is therefore highly important when investigating. Due to the limitation of tools that can extract forensically valuable data from registry files, investigators have to extract it manually. Because of the registry file format (.REG), extracting information is a challenging task for investigators. Registry files normally store data under unique values called “Keys”. One challenge that investigators must face is the lack of knowledge about Registry Keys and the data which stored under those Keys. This article provide an overview of registry file acquisition, registry structure and common issues in registry analysis.

Read More
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (7946 reads)

UK Police Forces Select HancomGMD Mobile Forensics Solution For Their Needs

Thursday, April 04, 2019 (08:59:34)
HancomGMD has secured a contract to supply its forensic solution to investigation agencies in the UK, an affiliate of Hancom Group said Monday.

The company said it signed a contract with the West Midlands Counter Terrorism Unit and Leicestershire Police in the UK to provide its MD-NEXT and MD-RED.
  • Posted by: YJOH
  • Topic: News
  • Score: 0 / 5
  • (8107 reads)

Techno Security And Digital Forensics Conference CA 2019 – Recap

Thursday, April 04, 2019 (07:49:11)
by Mattia Epifani

The Techno Security and Forensics CA conference took place between 11th and 13th March at The Hilton Torrey Pines in La Jolla (San Diego). More than 200 attendees were present, coming from different fields like digital forensics, e-discovery, incident response and cybersecurity. Most of the attendees were from the U.S. but many people from Canada and Europe were also present.

Forensic Focus was present for the entire conference and documented it in real-time on Twitter. The conference had four different tracks (Forensics, Audit/Risk Management, Information Security and Investigation) and more than 75 talks took place there.

Read More
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (1001 reads)

Oxygen Forensics Launches Industry Exclusive Drone Update

Wednesday, April 03, 2019 (11:47:30)
Oxygen Forensics today becomes the sole company in the industry to offer complete flight history extraction from my MyParrot cloud with the release of Oxygen Forensic Detective (11.3).

Career Paths In Digital Forensics

Wednesday, April 03, 2019 (09:12:05)
by Christa Miller, Forensic Focus

In the 30 or so years since the advent of personal computers made digital forensics a viable career path, the profession has matured to the extent of making multiple career paths possible. Now, professionals who are interested in digital forensics have options that range from law enforcement and government investigations, to corporate and self-employed consulting — and often switch between tracks.

Of course, having so many options means that forensic professionals have to be intentional about setting and following their course. The field continues to evolve, so new options may make themselves available in the short or long terms.

Read More
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (7619 reads)

Passware Kit 2019 v2 Released: Extracts Data From iCloud Keychain & LastPass

Wednesday, April 03, 2019 (08:01:57)
What's New

  • Extraction of iCloud keychain records
  • Export and import of password recovery state
  • Password recovery for LastPass databases
  • Passwords extraction from 1Password databases
  • Instant decryption of VeraCrypt volumes for Linux
  • Password recovery for LUKS: support for an additional encryption type
  • Improved support for Amazon Elastic Compute Cloud

CGC Monitor: A Vetting System For The DARPA Cyber Grand Challenge

Monday, April 01, 2019 (11:05:01)
Michael Thompson and Timothy Vidas discuss their work at DFRWS US 2018.

Joe: So, here we have Michael and Tim, who will be talking about their paper, ‘CGC Monitor: A Vetting System for the DARPA Cyber Grand Challenge’.

Timothy: Hi. Thanks for sticking around for the last paper, presentation, [anyway], looks like a few more people have trickled in since breakfast. I’m Tim and this is Mike. And we both worked on the DARPA Cyber Grand Challenge program for about three years. And that concluded just under two years ago now, and the DEF CON conference in Las Vegas. So, we wanted to … it took a little bit to get through all of the disclosure and vetting and [01:01] processes for getting information out from the project, as is sometimes the case with government work. But we wanted to talk about a little piece of the integrity system that was forensically … doing some forensics on the submissions from the competitors.
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (8351 reads)