Law Enforcement Professionals Need to Evaluate Digital Forensics Practices...
by L.E. “Ted” Wilson There is a fascinating constitutional showdown brewing in the U.S. that will have significant implications for how our law enforcement agencies are able to conduct digital...
View ArticleJailbreaking iOS 11 And All Versions Of iOS 10
by Oleg Afonin, Mobile Product Specialist at ElcomSoft Jailbreaking iOS is becoming increasingly difficult, especially considering the amounts of money Apple and independent bug hunters are paying for...
View Article2018 Nuix Insider Conference Recap
by Jessica Lyford Close to 300 customers, partners, and guests converged at the Royal Lancaster London for Nuix’s annual Insider Conference last week to share their experience using Nuix or to learn...
View ArticleFinding Metasploit’s Meterpreter Traces With Memory Forensics
by Oleg Skulkin & Igor Mikhaylov Metasploit Framework is not only very popular among pentesters, but is also quite often used by real adversaries. So why is memory forensics important here? Because...
View ArticleTechno Security & Digital Forensics 2018 – Myrtle Beach 3rd-6th June
From the 3rd to the 6th of June 2018, Forensic Focus will be attending the Techno Security & Digital Forensics Conference in Myrtle Beach, South Carolina, USA. If there are any topics you’d...
View ArticleChanges To Forensic Laboratory Accreditation Requirements – ISO/IEC 17025
by Tim Alcock ISO/IEC 17025:2017 – General requirements for the competence of testing and calibration laboratories is the principal international standard for the accreditation of laboratories...
View ArticleUsing Technology To Get Results: Think Outside The Silo
by Johann Hofmann, Griffeye In an article series of three, published in the Interpol Newsletter, Griffeye explores the possibilities of technology in digital media investigations. In this second...
View ArticleSearching And Filtering Emails when Forensically Collecting Mailboxes
by Arman Gungor When mailboxes are forensically preserved for eDiscovery or digital forensic investigations, their contents are almost always searched and filtered. Filtering emails helps overcome...
View ArticleADR512 Testing
by Andrey Fedorov The purpose of this article is to find additional information about the capabilities, specifics, and USPs of the ADR512 Android Data Recovery program. A full description of this...
View ArticleDigital Forensics Resources
by Scar de Courcier One of the most frequent questions I’m asked by digital forensics students is about resources: where can they go to continue learning, where can they find out more about the...
View ArticleApple iPhone Forensics: Significant Locations
by Patrick Siewert, Principal Consultant, Pro Digital Forensic Consulting I recently attended a conference of civil litigators in Virginia. During the cocktail hour and after a very interactive CLE...
View ArticleTechno Security Myrtle Beach 2018 – Recap
by Scar de Courcier This article is a recap of some of the main highlights from the Techno Security & Forensic Investigation Conference 2018, which took place in Myrtle Beach, SC from the 3rd-6th...
View ArticleEvaluating Automated Facial Age Estimation Techniques For Digital Forensics
by Felix Anda, David Lillis, Nhien-An Le-Khac & Mark Scanlon Abstract In today’s world, closed circuit television, cellphone photographs and videos, open-source intelligence (i.e., social media/web...
View ArticleDeep Learning At The Shallow End: Malware Classification For Non-Domain Experts
by Quan Le, Oisín Boydell, Brian Mac Namee & Mark Scanlon Abstract Current malware detection and classification approaches generally rely on time consuming and knowledge intensive processes to...
View ArticleElectromagnetic Side-Channel Attacks: Potential For Progressing Hindered...
by Asanka Sayakkara, Nhien-An Le-Khac & Mark Scanlon Abstract Digital forensics is a fast-growing field involving the discovery and analysis of digital evidence acquired from electronic devices to...
View ArticleUsing IMAP Internal Date for Forensic Email Authentication
by Arman Gungor Internal Date is an IMAP Message Attribute that indicates the internal date and time of a message on an IMAP server. This is a different timestamp than the Origination Date field found...
View ArticleTechno Security & Digital Forensics 2018 – San Antonio September 17-19
From the 17th to the 19th of September 2018, Forensic Focus will be attending the Techno Security & Digital Forensics Conference in San Antonio, Texas, USA. If there are any topics you’d...
View ArticleGiving Back In DFIR
by Jessica Hyde, Magnet Forensics A few months back I was on my way to BSides NoVa, having a conversation with someone competing in the CTF about where his team would donate the prize money to if they...
View ArticleReducing The Mental Stress Of Investigators
by Eric Oldenburg, Griffeye We recently met up with Eric Oldenburg, Griffeye’s new Law Enforcement Liasion in North America, and heard about his new role. Here, he explains how reducing mental stress...
View ArticleHave Your Say In The House Of Lords’ Select Committee On Science And Technology
Controversy has been raging around ISO 17025 ever since the standard was adopted for digital forensics back in October 2017. Although many people who work in the industry agree that standardisation is...
View Article