Quantcast
Channel: Forensic Focus – Articles
Browsing all 350 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

A Survey On Data Carving In Digital Forensics

by Nadeem Alherbawi*, Zarina Shukur & Rossilawati Sulaiman; Faculty of Information Science and Technology, Universiti Kebangsaan Malaysia Abstract Data carving is a very important topic in digital...

View Article


Image may be NSFW.
Clik here to view.

How Do Criminals Communicate Online?

Flashpoint, a business intelligence agency specialising in the deep and dark web, recently published a report on the economy of criminal networks online. The report looks not only at where criminals go...

View Article


Image may be NSFW.
Clik here to view.

Enfuse 2017 – Las Vegas 22-25 May

From the 22nd to the 25th of May 2017, Forensic Focus will be attending Enfuse (formerly known as CEIC) in Las Vegas, Nevada, USA. If there are any topics you’d particularly like us to cover, or any...

View Article

Image may be NSFW.
Clik here to view.

Internet Of Things Mobility Forensics

by K M Sabidur Rahman & Matt Bishop (University of California Davis) and Albert Holt (NSA) Abstract The Internet of Things (IoT) comes with great possibilities as well as major security and privacy...

View Article

Image may be NSFW.
Clik here to view.

Classifying Illegal Activities On Tor Network Based On Web Textual Contents

by Mhd Wesam Al Nabki, Eduardo Fidalgo, Enrique Alegre & Ivan de Paz; Department of Electrical, Systems and Automation, University of Leon, Spain & INCIBE Spanish National Cybersecurity...

View Article


Image may be NSFW.
Clik here to view.

Enfuse 2017 – Recap

by Mattia Epifani, Forensic Focus The Enfuse Conference, organized by Guidance Software, took place between 21st and 24th May at Caesar Palace Conference Center in Las Vegas. More than 1,500 attendees...

View Article

Image may be NSFW.
Clik here to view.

Challenges Of ISO 17025 Accreditation – Survey Results

A group of forensic practitioners has recently conducted a survey into the ISO 17025 scheme – its effectiveness, and its relevance for digital forensics. The survey was conducted using Google Forms and...

View Article

Image may be NSFW.
Clik here to view.

An Introduction To Theft Of Trade Secrets Investigations

by Laurence D. Lieb, Managing Director, HaystackID. The subjects we will be covering include: Defining When One Should Reasonably Panic Reasonable Triage Steps to Take in Order to Identify if There is...

View Article


Image may be NSFW.
Clik here to view.

A Method For Verifying Integrity And Authenticating Digital Media

by Martin Harran, William Farrelly & Kevin Curran Due to their massive popularity, image files, especially JPEG, offer high potential as carriers of other information. Much of the work to date on...

View Article


Image may be NSFW.
Clik here to view.

Remote Forensics Of Windows 10 Mobile Devices

by Oleg Afonin, Elcomsoft Microsoft has developed Windows 10 as the one OS for all types of devices from servers to wearables. Desktops, laptops, two-in-ones, tablets and smartphones can (and do) run a...

View Article

Image may be NSFW.
Clik here to view.

RAM Forensic Analysis

by Eliézer Pereira 1 Goal The purpose of this article is show how to perform a RAM memory forensic analysis, presenting some examples of information that can be retrieved and analyzed to help identify...

View Article

Image may be NSFW.
Clik here to view.

An Introduction To Challenges In Digital Forensics

by W.Chirath De Alwis Digital forensics is a technique in the identification of computer based crimes. But digital forensics faces a few major challenges when it comes to conducting investigations....

View Article

Image may be NSFW.
Clik here to view.

The Future Of ENF Systems

by James Zjalic The subject of authentication is important across the entire digital forensic field and we as examiners have various weapons at our disposal in which to defend against the onslaught of...

View Article


Image may be NSFW.
Clik here to view.

Techno Security 2017 – San Antonio September 18th-20th

From the 18th to the 20th of September, the Techno Security & Digital Forensics Conference will be taking place in San Antonio, Texas, USA. If there are any topics you’d particularly like to see...

View Article

Image may be NSFW.
Clik here to view.

Digital Forensics as a Big Data Challenge

by Alessandro Guarino, StudioAG Abstract Digital Forensics, as a science and part of the forensic sciences, is facing new challenges that may well render established models and practices obsolete. The...

View Article


Image may be NSFW.
Clik here to view.

Physical Imaging Of A Samsung Galaxy S7 Smartphone Running Android 7.0

by Oleg Skulkin & Igor Shorokhov The release of Android Nougat has brought new challenges to mobile forensic examiners: the smartphones running this version most likely have encrypted partitions...

View Article

Image may be NSFW.
Clik here to view.

When No Conclusion Can Be A Conclusion

by James Zjalic Before CCTV systems were conceived, eye-witness accounts were the only method of identifying a suspect based on their facial features. The pitfalls of this type of identification have...

View Article


Image may be NSFW.
Clik here to view.

Cellular GPS Evidence: Waze + Cellebrite + CellHawk

by Patrick Siewert, Principal Consultant, Pro Digital Forensic Consulting It’s becoming common knowledge that location evidence on cellular devices can provide a wealth of evidence in any number of...

View Article

Image may be NSFW.
Clik here to view.

New Security Measures In iOS 11 And Their Forensic Implications

by Oleg Afonin, Elcomsoft Apple is about to launch its next-generation iOS in just a few days. Researching developer betas, we discovered that iOS 11 implements a number of new security measures. The...

View Article

Image may be NSFW.
Clik here to view.

Digital Forensics: Iron Bars, Cement And Superglue

by James Zjalic When most people think of digital forensics they think of CSI Miami: hackers in hoodies and Mission Impossible type biometrics. But under the superficial exterior, there is a framework...

View Article
Browsing all 350 articles
Browse latest View live