±Forensic Focus Partners

Become an advertising partner

±Your Account


Username
Password

Forgotten password/username?

Site Members:

New Today: 0 Overall: 32358
New Yesterday: 1 Visitors: 126

±Follow Forensic Focus

Forensic Focus Facebook PageForensic Focus on TwitterForensic Focus LinkedIn GroupForensic Focus YouTube Channel

RSS feeds: News Forums Articles

±Latest Articles

RSS Feed Widget

±Latest Webinars

Latest Forum Posts

 
 Topics   Replies   Author   Views   Last Post 
  Paraben E3: DS software 0 Ricco 89   Wed Jun 28, 2017 10:18 pm 
Ricco
  Spyware detection methodologies on iOS 1 giuseppem 108   Wed Jun 28, 2017 10:03 pm 
Igor_Michailov
  Photo manipulation - points to prove? 3 wotsits 228   Wed Jun 28, 2017 9:13 pm 
badgerau
  DHCP-Geotimeline Forensics 8 RolfGutmann 597   Wed Jun 28, 2017 9:08 pm 
badgerau
  Digital Forensic Opportunities – Manchester 4 seansmyth10 1913   Wed Jun 28, 2017 6:27 pm 
Gus63

Interview With Lesley Carhart, DFIR & OSINT Consultant

Wednesday, June 28, 2017 (08:57:55)
Can you tell us something about your background and why you decided to work in this field?

Sure. My background is a little unusual. I started coding when I was about seven, and I got my first job as professional programmer when I was 15.

I was of course very involved at the time in the Chicago hacker community, and that’s kind of how I learned about digital forensics, when it was a new field, and that it was something that I was really interested in doing.

Read More
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (381 reads)

Interview With Edewede Oriwoh, Independent Cyber-Physical Security Researcher

Tuesday, June 27, 2017 (07:20:57)
Edewede, you spent some time as a post-doctoral researcher at the University of Bedfordshire. What was your area of study, and what first sparked your interest in it?

My research involved investigating security threats in Smart Homes (SH) and developing an anomaly detection framework and a presence detection model for Smart Homes. It was clear in the early stages of my research that security was (and this is sometimes the case with major technological developments) not quite prominent in discussions and developments around the IoT. In recognition of the importance of the security within SH, I developed the concept of a Cyber-physically secure “Happy Home” which is a baseline security model in which all the elements in a SH are at their most secure state. These elements are a set of attributes (or features) which can be used to build a “Happy Home” - or the equivalent for any other Cyber-physical environment. Deviations from this baseline can be used to identify anomalies in the overall SH system.

Read More
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (358 reads)

RAM Forensic Analysis

Monday, June 26, 2017 (09:25:40)
by Eliézer Pereira

1 Goal


The purpose of this article is show how to perform a RAM memory forensic analysis, presenting some examples of information that can be retrieved and analyzed to help identify indications of security incidents as well as fraud and other illegal practices through information systems.

2 Good Practices and Techniques for Computer Forensic Analysis

2.1 NIST 800-86


The National Institute of Standards and Technology (NIST) is known worldwide for the publication of documents that bring well detailed and well comprehensive technology standards.

Document 800-86 – Guide to Integrating Forensic Techniques into Incident Response has a number of recommendations for proceeding with forensic analysis of security incidents, from data collection to the preparation of a final report.

Read More
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (505 reads)

Job Vacancy: Lecturer In Digital Forensics (2 Posts)

Friday, June 23, 2017 (11:45:23)
School of Cranfield Defence and Security

Lecturer in Digital Forensics (2 posts)

Permanent

Lecturer Salary: £41,153 to £45,872 per annum (with additional performance related pay up to £57,340 per annum)

Location: Shrivenham, Oxfordshire, SN6 8LA

Here at Cranfield, we can offer you the opportunity and resources to really develop your career. Cranfield Defence and Security (CDS) provides unique educational opportunities to the defence and security sectors of both public and private sector organisations.

Cranfield Forensic Institute (CFI) provides a Centre of Excellence for the application of science and technology to law enforcement particularly, through forensic science and engineering. The Digital Forensics Unit is part of the Cranfield Forensic Institute and is in a fast moving academic and practical arena, with sought after expertise and considerable credentials in the area of forensic computing. The MSc in Digital Forensics run by the Digital Forensics Unit was the first Digital Forensics course to gain full certification from GCHQ.

Read More
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (472 reads)

Remote Forensics Of Windows 10 Mobile Devices

Friday, June 23, 2017 (07:50:24)
by Oleg Afonin, Elcomsoft

Microsoft has developed Windows 10 as the one OS for all types of devices from servers to wearables. Desktops, laptops, two-in-ones, tablets and smartphones can (and do) run a version of Windows 10. There are countless forensic tools for acquiring evidence from the desktop version of Windows 10, much less for Windows-powered smartphones.

Forensic analysis of Windows 10 Mobile devices can be complicated due to the exotic status of such devices. Due to full-disk encryption, on-device access may not be an option. However, Microsoft collects enormous amounts of information from its users. This information is then stored in the user’s Microsoft Account. Some bits of data are fully accessible to the user, while access to some other bits (such as mobile backups) is restricted.

Read More
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (563 reads)

Laminar Flow Cabinet from HddSurgery

Thursday, June 22, 2017 (12:49:00)
HddSurgery Ltd. is a global leader in providing professional data recovery and computer forensic hardware tools since 2009.

Our mission is to find optimal solutions for common mechanical problems with hard drives, such as broken heads, head stiction and jammed spindle.

Beside the tools which solve these problems, our company provides assistive data recovery tools like Workbench, Platter stand, Head holder and Unlock key.

This year we introduced the most sophisticated product from our company – HDDS Horizontal Laminar Flow Cabinet M.

Interview With Cesar Leon, Head Of Support Team, Oxygen Forensics

Thursday, June 22, 2017 (09:24:52)
Cesar, you're Head of the Support Team at Oxygen. Tell us about your role - what does your day-to-day job look like?

Hey! My role right now is to help my team supporting our software to our end users all over the world, to the best of our abilities. Whether that be with helping with technical issues, or commercial issues, I help my team with whatever questions or concerns they need.

My day to day really varies, as one day it can be all research into why a particular problem is occurring with the software, or another day helping our Sales Team complete a huge order. I’m a jack of all trades for the company, and every day brings new challenges and tasks.

Read More
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (482 reads)

Digital Forensics News June 2017

Wednesday, June 21, 2017 (10:16:11)
ADF Solutions have partnered with Belkasoft to help their customers analyse mobile devices.

Christopher Woods from Nuix talks about the need for training to focus on the practical rather than the theoretical.

Atola Technology continue their series of how-to blog posts with a guide to creating a logical image of a source drive.

Greg at Trewmte has written about WhatsApp network forensics.

Belkasoft have released Evidence Center v.8.4.
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (1008 reads)

Belkasoft Evidence Center 8.4 Offers Advanced Mobile Forensics

Wednesday, June 21, 2017 (07:54:16)
Belkasoft rolls out a major update to Belkasoft Evidence Center 2017. The new release delivers major improvements in mobile forensics, offering low-level data extraction from Android smartphones and logical and over-the-air acquisition of iOS 10.x devices.

More: https://belkasoft.com/new
Try free: https://belkasoft.com/get
Sign up to a webinar: https://belkasoft.com/webinar

Webinar: Information Overload: Navigating In Today’s Regulatory Environment

Tuesday, June 20, 2017 (10:48:14)
Webinar: Information Overload: Navigating Information Risk, Investigations & Privacy in Today’s Regulatory Environment (…and Staying Compliant)

http://bit.ly/2szneQS

June 27th
Information Risk and Compliance in the Information Age

July 11th
Managing Internal Investigations Swamped With Data

July 25th
It’s No Secret: What New Data Protection Regulations Mean for Risk Management

All webinars will be held at 8:00 AM PT /11:00 AM ET / 4:00 PM UK
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (794 reads)