This news feed is supplied with permission from the Forensic Focus website.To read more on any news snippet click on its headline.
Atola Technology has announced a major update to Insight Forensic. All existing customers can freely download and install the new 4.2 software.
Having been asked many times by forensic experts to allow the creation of image files on target devices attached directly to an Atola DiskSense unit, this facility is now available.Posted: 30 January 2015
This article does not attempt to provide a beginners guide to Bitcoin, nor an in-depth thesis on Bitcoin forensics. Rather, it will be an overview of the potential opportunities available to digital forensics and traditional investigators to obtain evidence in relation to attributing transactions or holdings to a specific person and (legally) seizing those funds.
I will discuss academic work that has been undertaken in this area, what precautions a security aware user may take and the issues introduced by them doing so. I will also discuss an open-source Python tool called BTCscan, which has been created to accompany this article and will carve out bitcoin addresses, private keys and other Bitcoin artifacts.
This article may be of interest to persons conducting investigations for criminal, civil, personal or business reasons. Some elements may be of limited relevance to agencies without powers of seizure and/or subpoena…
Read MorePosted: 30 January 2015
Speaking on the ‘Fighting Shadows’ panel at the Davos convention in Switzerland on Saturday,Toomas Hendrik Ilves joined senior figures from Kaspersky, Microsoft and the United Nations in calling for improved cyber-crime policing, laws and collaboration – whilst also calling into question how – and if – countries can respond to cyber-attacks.
Estonian websites were famously hit by distributed-denial-of-service (DDoS) attacks in 2007, which at the time was rumoured to be work of the Russian government. Subsequently, the country became one of the world’s most advanced countries on cyber-security, even establishing the NATO Cooperative Cyber Defence of Excellence in Tallinn in August 2010. Ilves – who said that the country also helped with similar DDoS attacks against Georgian websites a year later – admitted that DDoS and nation-state attacks are very different things, but said that defending against cyber-criminals is almost impossible considering outdated laws…
Read (SC Magazine)Posted: 28 January 2015
Sanderson Forensics was recently contacted by a customer at a police force with a question relating to deleted SQLite records that were found in a rollback journal. The requirement was to create a report(s) showing both the live records in the Kik database as well as the deleted records that were found by a filename search in the rollback journal.
The article at the link below goes into a little detail of how the rollback journal works, some thoughts on recovering data from it and then details how the data was recovered from the rollback journal and then how we distinguished and created a report showing the deleted records in the journal vs the live records that were also present in the journal…
Read (Sanderson Forensics)Posted: 27 January 2015
Susteen Inc. has announced that Secure View 4 will be a free upgrade to ALL active Secure View users.
This will include all new customers up until the time Secure View 4 is launched. The current price for Secure View 3 stands at $2495. Although no current price for Secure View 4 has been listed, it is expected to start at $2995. This means that a new customer can still purchase Secure View at the current cost and get a free upgrade when Secure View 4 launches in late February 2015.
Secure View 4 will include industry first ACCE (Advanced Cross Case Examination) analytics allowing users to probe old cases with new data. SV4 will also include new deleted data features, an all new interface and a redesigned analytics engine. For a trial version of Secure View 3, contact: email@example.comPosted: 26 January 2015
(ISC)2® offers the Certified Cyber Forensics Professional (CCFP), the only global cyber forensics credential that provides a comprehensive validation of a candidate’s knowledge and skills as a digital forensics expert. Free CCFP Webcasts are now available that provide insight into what candidates need to know before taking this exam. It includes a detailed overview of each domain, the value of certification, and how to study for the exam
First introduced in 2013, CCFP provides the industry’s first global standard for assessing experienced digital forensics professionals’ mastery and professionalism. The credential provides digital forensics employers and the legal community with validation that a digital forensics professional can lead digital investigations that assure complete, accurate, and reliable results.Posted: 26 January 2015
Registration Opening Soon!
Join us for Magnet Forensics’ first-ever IEF User Summit at the 2015 Techno Security & Forensics Investigations Conference. Internet Evidence Finder users, and digital forensics professionals considering adding IEF to their toolkit, will learn how to use the software to its full potential to overcome key challenges in computer and mobile forensics. The program will include a mix of lectures and lab sessions led by Jad Saliba and Magnet Forensics’ team of digital forensics experts. If you’re attending Techno Security, extend your stay and join us for this no-cost event!
Wednesday, June 3 to Thursday, June 4 (immediately following Techno Security)
Myrtle Beach Marriott Resort & Spa at Grande Dunes
8400 Costa Verde Drive
Myrtle Beach, SC 29572
Read (Magnet Forensics)Posted: 26 January 2015
A recording of last month’s webinar “Investigating Sexual Crimes in the Tinder Age” is now available online here.
The usage of location-based mobile dating applications like Tinder and Grindr has exploded over the last year. This new class of mobile app allows singles to identify, chat with, and meet other singles located in their immediate vicinity. As the popularity of these apps continues to grow, they will become increasingly important sources of evidence for digital forensics examiners.
Join Jad Saliba and Jamie McQuaid from Magnet Forensics as they explore what you need to know about finding and analyzing evidence from this new class of mobile dating application using a real-world case scenario…
View WebinarPosted: 22 January 2015