This news feed is supplied with permission from the Forensic Focus website.To read more on any news snippet click on its headline.
First Ever Advanced Cross Case Analytics (ACCE) for mobile forensics will debut with Secure View 4!
Irvine, Ca. 4/27/2015
With the launch of Secure View 4 this Thursday, April 30th, 2015 new and current users will have access to the first ever ACCE analytics for mobile forensics called SV Detect. This breakthrough will allow users to increase conviction rates and build new evidence against past crimes. SV Detect will allow Secure View users to run newly acquired data against their old reports. This fantastic feature allows a user to run newly acquired contacts and text messages through old cases to match up data. This tool is a feature that can be turned on or off at your discretion. SV Detect is just one of the new features to be launched with Secure View 4.Posted: 28 April 2015
ReclaiMe – the only data recovery vendor providing BTRFS recovery
BTRFS is a filesystem from Linux which has several distinctive features such as copy-on-write, checksumming, data scrubbing, and more.
ReclaiMe Data Recovery Company integrated a new data recovery algorithm using which you can recover data from a failed BTRFS volume in their data recovery software – ReclaiMe Pro.Posted: 27 April 2015
Date/Time: Tuesday 5th May, 4pm BST/11am EDT
Speakers: Paul Slater, Director of Forensic Solutions EMEA at Nuix and Troy Bettencourt, Sales Engineer NA at Nuix
Investigators who are working with legacy digital forensic tools and faced with shrinking budgets often find it hard to see how they can keep up. Join this webinar to find out how you can work smarter, not harder, during a forensic investigation. Learn how to simplify, streamline and automate your workflows, analytics and review processes to help you deal with growing volumes of digital evidence and shrinking budgets.
We’ll show you how you can process more files and formats, integrate your workflows, and work collaboratively with technical investigators and subject matter experts to quickly get to the essence of the evidence.
Register now at http://info.nuix.com/policing-digital-crimes-of-today-FF.htmlPosted: 24 April 2015
Welcome to this round-up of recent posts to the Forensic Focus forums.
How would you acquire data from a password protected MS Surface Pro?
Forum members discuss malware risk mitigation on forensic workstations.
How can a split E01 image of a Windows 7 Enterprise SP1 physical disk protected by BitLocker be mounted? Forum members come up with a solution.
Minime2k9 asks how to find evidence of remote desktop login outside of the Windows Security log.
Should you keep a chain of custody for forensic investigations in corporate environments? Add your thoughts on the forum.
Forum members discuss a timestamp discrepancy on an acquired Linux machine.
How do you recover deleted Snapchat images on an iPhone 4S? Chime in on the forum.
Forum member liguoroa gives feedback on BlessHex editor.Posted: 24 April 2015
Bruno, you’re CISO of the Republic and Canton of Jura in Switzerland. Could you tell us a bit about your job and what a typical day involves?
Sure. As Chief Security Officer for cybersecurity I’m involved in ensuring security of the state. That means we have mostly 400 locations for different applications, for example schools, healthcare industry, roads, taxes, police and so on. So the perimeter I have to secure is quite broad. The problem we have is that I have to check all the risks involving this perimeter and also understand the needs of the business, because every business has different needs. So we have to match guidelines also from the Swiss contribution, and ISO 27001 standards, to define policies and roles. So that’s my main job and that takes a lot of time because we have to be compliant.
Read MorePosted: 23 April 2015
Very important part of HDD functioning is a principle of heads parking while device is turned off. During the decades of HDD development, numerous improvements in this area were seen. These changes positively affected data security, capacity, product lifetime and decreased device dimensions.
When hard drive is turned off, its sensitive heads must be parked at a “safe place”. This safe area, must be designed in such way, that read/write heads can’t be damaged and that valuable data is not threatened in any way.Posted: 22 April 2015
I’ve been doing quite a bit of public speaking lately — usually about cybercrime and underground activity — and there’s one question that nearly always comes from the audience: “Why are these fraud Web sites allowed to operate, and not simply taken down?” This post is intended to serve as the go-to spot for answering that question.
Q: Why not take down the hundreds of sites now selling stolen credit cards and identity data?
For starters, it’s not always so easy to take these sites offline. Many of them rely on domain name registrars that routinely ignore abuse requests. The same goes for the organizations hosting a number of these unsavory markets.
Read (KrebsOnSecurity)Posted: 20 April 2015
From May 11-July 1, 2015, (ISC)2 is delivering Live OnLine Training courses to provide expert-level instruction for those interested in attaining CCFP certification (Certified Cyber Forensics Professional).
The courses are delivered through the (ISC)2 Learning Center, a centralized platform that allows learners to access CCFP training materials, educational resources and manage their (ISC)2 online training in one environment.Posted: 17 April 2015