Quantcast
Channel: Forensic Focus – Articles
Browsing all 350 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Evidence Acquisition and Analysis from Live Exchange

A great amount of legal and forensics discussion is involved when there is an investigation procedure that involves the seizing of crucial evidence from Live Exchange server. Whenever there is such an...

View Article


Image may be NSFW.
Clik here to view.

FT Cyber Security Summit Europe – London 22nd September

On the 22nd of September 2015, Forensic Focus will be attending the FT Cyber Security Summit in London. If there are any topics you’d specifically like us to cover, or any speakers you think we should...

View Article


Image may be NSFW.
Clik here to view.

Project Spartan Forensics

by James Gratchoff & Guido Kroon, University of Amsterdam Project Spartan is the codename of the new Microsoft Edge browser and successor to its previous, Internet Explorer. This research paper...

View Article

Image may be NSFW.
Clik here to view.

NAS Forensics Explained

by Oleg Afonin, Danil Nikolaev & Yuri Gubanov © Belkasoft Research 2015 Network Attached Storage (NAS) have a long track history of corporate deployments. Their scaled-down versions (ranging from...

View Article

Image may be NSFW.
Clik here to view.

Standard Processes in Windows 10

by Robin Brocks On the 29th of June, Microsoft announced  the release of Windows 10, so it is time to have a deeper look at this new Operating System from the perspective of an Incident Responder. To...

View Article


Image may be NSFW.
Clik here to view.

BYOD Forensics – Bring Your Own Device Or Breach Your Own Data?

The concept of BYOD is not new; the oldest example would be carrying personal USB thumb drives to work. Since then technology has grown, and so has the BYOD trend. Statistics indicate that the medium...

View Article

Image may be NSFW.
Clik here to view.

Electronic Voiceprints: The Crime Solving Power of Biometric Forensics

By Jared Stern Fingerprinting has been used for years to determine the individuality of a person. But, newer technology allows investigators to capture a person’s voice, a so-called “voiceprint.”...

View Article

Image may be NSFW.
Clik here to view.

Linux Timestamps, Oh boy!

Timestamps are critical for analysts; they usually deal with different filesystems and understanding how the file timestamps work on each is crucial to what they do. If you do an online search for...

View Article


Image may be NSFW.
Clik here to view.

Countering Anti-Forensic Efforts – Part 1

by Oleg Afonin, Danil Nikolaev & Yuri Gubanov © Belkasoft Research 2015 Computer forensic techniques allow investigators to collect evidence from various digital devices. Tools and techniques exist...

View Article


Image may be NSFW.
Clik here to view.

Windows 8 Touch Keyboard Forensics

Microsoft released Windows 8 in 2012. With this new version, Microsoft made a fundamental shift in Windows 8 as compare to older versions of Windows. It does not only target netbooks, laptops and...

View Article

Image may be NSFW.
Clik here to view.

Countering Anti-Forensic Efforts – Part 2

by Oleg Afonin, Danil Nikolaev, Yuri Gubanov © Belkasoft Research 2015 In the first part of this paper we talked about the most common – and also some of the simplest – ways suspects can try to cover...

View Article

Image may be NSFW.
Clik here to view.

SADFE 2015 – Malaga 30th September – 2nd October

From the 30th of September until the 2nd of October 2015, Forensic Focus will be attending the 10th International Conference on Systematic Approaches to Digital Forensic Engineering (SADFE) in Malaga,...

View Article

Image may be NSFW.
Clik here to view.

FT Cyber Security Summit 2015 – Recap

This article is a recap of some of the main highlights from the FT Cyber Security Summit, which took place in London on Tuesday the 22nd of September 2015. Conference Highlights The day began with a...

View Article


Image may be NSFW.
Clik here to view.

Microsoft Edge Browser Forensics – Exploring Project Spartan

Formerly known as Internet Explorer and then as Project Spartan, Microsoft Edge Browser has evolved a lot. From the User Interface to the technology it’s built upon, the browser has completely changed...

View Article

Image may be NSFW.
Clik here to view.

SQLite Database Deleted Records Carving & Forensics

SQLite is a compact database engine highly integrated with embedded devices and locally used applications in various Operating Systems. Recent years have seen extensive usage of portable devices like...

View Article


Image may be NSFW.
Clik here to view.

SADFE 2015 – Recap

This article is a recap of some of the main highlights from the Systematic Approaches to Digital Forensics Engineering conference, held in Malaga from the 30th of September to the 2nd of October 2015....

View Article

Image may be NSFW.
Clik here to view.

Investigating and Prosecuting Cyber Crime: Forensic Dependencies and Barriers...

Abstract The primary goal of this paper is to raise awareness regarding legal loopholes and enabling technologies, which facilitate acts of cyber crime. In perusing these avenues of inquiry, the author...

View Article


Image may be NSFW.
Clik here to view.

The Future of Mobile Forensics: November 2015 Follow-Up

by Oleg Afonin, Danil Nikolaev, Yuri Gubanov Mobile forensics is a moving target. In our recent article, “The Future of Mobile Forensics”, we described acquisition techniques that used to be...

View Article

Image may be NSFW.
Clik here to view.

Forensic Analysis Of Third Party Applications: Instagram

by Nor Zarina Binti Zainal Abidin Abstract Forensic analysis of mobile phones’ third party applications is a new area that needs to be explored. There are a lot of third party applications available in...

View Article

Image may be NSFW.
Clik here to view.

Virtual Hard Disk Image Format – A Forensic Overview

by Anil Kumar Types of Virtual Hard Disk Image Format The hard disk of a VM is implemented as the files, which live on their native file systems of the host machine. MS Virtual PC & MS Virtual...

View Article
Browsing all 350 articles
Browse latest View live