Forensics Europe Expo – Recap
This article is a recap of some of the main highlights from the Forensics Europe Expo which took place at Kensington Olympia Conference Centre, London, on the 19th-20th of April 2016. Conference...
View ArticleSSD and eMMC Forensics 2016 – Part 3
What Has Changed in 2016 in the Way SSD Drives Self-Destruct Evidence: Demystifying eMMC, M.2, NVMe, and PCI-E. by Yuri Gubanov & Oleg Afonin © Belkasoft Research 2016 In the previous part of the...
View ArticleHiding Data from Forensic Imagers – Using the Service Area of a Hard Disk Drive
By Todd G. Shipley and Bryan Door (A complete copy of this white paper and its figures, images and diagrams can be found at www.nfdrtc.net). I. Summary Kaspersky Labs® recently released their research...
View ArticleMeeting A Forensic Challenge: Recovering Data From A Jolla Smartphone
by Davide Gabrini, Andrea Ghirardini, Mattia Epifani and Francesco Acchiappati Preface During the hacking camp MOCA 2016, at the end of a talk held by Davide “Rebus” Gabrini on passcode circumvention...
View Article10 DFIR Blogs You Don’t Want to Miss
by Christa M. Miller Digital forensics is a tough job. Forensicators must evolve as rapidly as the technology does, which means being in a constant state of learning. Formal education is costly and...
View ArticleInSig2 LawTech 2016 – Brussels 7th – 8th November
From the 7th – 8th of November 2016, Forensic Focus will be attending InSig2’s Law Tech Europe conference in Brussels, Belgium. If there are any topics you’d particularly like us to cover, or any...
View ArticleMalware Can Hide, But It Must Run
by Alissa Torres, SANS Certified Instructor It’s October, haunting season. However, in the forensics world, the hunting of evil never ends. And with Windows 10 expected to be the new normal, digital...
View ArticleForensic Implications of iOS Lockdown (Pairing) Records
by ElcomSoft In recent versions of iOS, successful acquisition of a locked device is no longer a given. Multiple protection layers and Apple’s new policy on handling government requests make forensic...
View ArticleNew Federal Rule of Evidence to Directly Impact Computer Forensics and...
by John Patzakis, X1 A key amendment to US Federal Rule of Evidence 902, in the form of new subsection (14), will go into effect on December 1, 2017. This amendment will significantly impact eDiscovery...
View ArticleDigital Forensic Investigational Tool For Volatile Browser Based Data...
by W.Chirath De Alwis, School of Computing, Asia Pacific Institute of Information Technology, Colombo, Sri Lanka Abstract Cyber security threats on sensitive resources have increased recently and it...
View ArticleWindows 10 PE for Digital Forensics
by Robin Brocks, IT Forensic Expert and Incident Responder Only a few years ago, it was a real pain creating a portable Windows on CD/ DVD or thumb drive, because the Operating System was not prepared...
View ArticleMobile Forensics Monkey Wrench: iOS 10.2 and Encryption
by Patrick Siewert, Pro Digital Forensic Consulting It’s not secret to those involved in the study and practice of mobile forensics that Apple likes to throw us curve balls with almost every new...
View ArticleUnlocking The Screen of an LG Android Smartphone with AT Modem Commands
by Oleg Davydov, CTO, Oxygen Forensics Modern smartphones are much more than just a device for voice calls. Now they contain a lot of personal data – contact list, communication history, photos,...
View ArticleSamsung sBrowser – Android Forensics: A Look Into The Cache Files
by Robert Craig and Michael Lambert Abstract Samsung devices are a large portion of the Android OS market. Samsung has its own Internet Browser, “sbrowser”, installed onto their devices. All web...
View ArticleAsking A VPS To Image Itself
by Chris Cohen There is a Linux Virtual Private Server (VPS) that you have been tasked to collect using a forensically sound method while ensuring confidentiality, integrity and availability. You have...
View ArticleNuix Web Review & Analytics: Process, Search And Review Evidence In A Single...
by Scar de Courcier, Forensic Focus Background Nuix Web Review & Analytics (WR&A) was created to enable analysts and non-technical investigators to collaborate on investigations. The tool...
View ArticleTechno Security 2017 – Myrtle Beach 4th – 7th June
From the 4th to the 7th of June 2017, Forensic Focus will be attending the Techno Security & Digital Forensics Conference in Myrtle Beach, South Carolina, USA. If there are any topics you’d...
View ArticleA Survey On Data Carving In Digital Forensics
by Nadeem Alherbawi*, Zarina Shukur & Rossilawati Sulaiman; Faculty of Information Science and Technology, Universiti Kebangsaan Malaysia Abstract Data carving is a very important topic in digital...
View ArticleHow Do Criminals Communicate Online?
Flashpoint, a business intelligence agency specialising in the deep and dark web, recently published a report on the economy of criminal networks online. The report looks not only at where criminals go...
View ArticleEnfuse 2017 – Las Vegas 22-25 May
From the 22nd to the 25th of May 2017, Forensic Focus will be attending Enfuse (formerly known as CEIC) in Las Vegas, Nevada, USA. If there are any topics you’d particularly like us to cover, or any...
View Article