dfinews.com

Please wait for loading...




      (240):

    /
     1  +1 2014 aug 24stenography for phone numberSteganography and Smart Phones - DFI NewsA large number of data hiding Apps for Android, iOS, and Windows mobile platforms are rapidly emerging. Being able to identify them and the ...
     1  +1 2014 jul 30computer forensics newsTopics | Computer Forensics - DFI NewsComputer Forensics is the methodical series of procedures and techniques used for procuring evidence from computer systems and storage media.
     2  ~ 2014 jul 25protocol hiding methodProtocol Data Hiding - DFI NewsVulnerabilities in the Transmission Control Protocol (TCP) present a very simple and straight-forward method for hiding data in the TCP initial ...
     3  ~ 2014 aug 01digital forensics websiteDFI News |Digital forensic science is not a matter of recovering a file that proves somebody's ... websites and other services over a five-month span beginning in February.
     5  -1 2014 sep 05radio tactics acesoRadio Tactics Launches Aceso v5 Mobile Phone Forensics EquipmentThe Aceso v5 is an upgrade to the existing Radio Tactics Aceso device, which enables users to recover evidence from mobile phone handsets, ...
     5  +15 2014 aug 10remote forensic softwareProduct Insight: Remote Forensic Acquisition Using Hardware ToolsThis group of resources (write-blocker, host computer, and software ; or alternatively: a forensic duplicator) has invariably required the local ...
     5  -2 2014 aug 05computer forensic statement witnessPreparing an Expert Report - DFI NewsIn most cases a computer forensic expert is called upon to prepare a ... (i) a complete statement of all opinions the witness will express and the ...
     6  +13 2014 jul 30forensic expert witnessHow to Be an Effective Expert Witness in Court: Part 1 - DFI NewsOne of a computer forensic expert's most important functions is to serve as a testifying expert in court. This series of articles is intended to ...
     7  +13 2014 sep 01copy evidence softwareHelping an Attorney Prove an Employee Theft/Theft of Trade Secrets For example, the employee may have copied a key marketing memo ... A registry analysis can also provide evidence of suspect software being ...
     8  +93 2014 sep 30key computer forensicComputer Forensics Key in Hot Car Child Death Case - DFI NewsComputer forensics will be key in the case as police uncovered Harris' sexting and penchant for videos about death from his computers.
     8  ~ 2014 aug 18sample computer forensics reportReport Writing for Digital Forensics - DFI NewsEffectively reporting what you found during your forensic ... In this blog post, we are going to tackle some more report writing issues. by Brad GarnettLink: Computer Forensics and Incident Response .... View Sample ».
     9  ~ 2014 sep 27google analytics cookies parseGoogle Analytics Cookies and the Forensic Implications - DFI NewsWith the advent of Google Analytics (GA) cookies , that has changed. .... The same procedure used in parsing Firefox™ cookies can be used ...
     11  +18 2014 jul 20forensic audio courseAudio Forensics Training Class in New York - DFI NewsTracer Technologies will hold its popular Audio Forensics training class in West Chester, New York, June 22-24.
     12  +27 2014 jul 31computer fornesic webinarWebinars - DFI NewsThe Role of a Computer Forensic Expert From Retention Through Trial ... In this webinar , the authors of "Mediated Investigative E-Discovery", recently published  ...
     13  -4 2014 aug 08plist forensic macMac Forensics : Viewing, Understanding, Deconstructing and In part one of this blog series we covered the many ways a Mac forensic examiner may view . plist files using both Apple and third-party tools.
     13  +11 2014 jul 22memory forensics toolsMemory Forensics : Where to Start - DFI NewsTwo popular memory forensic tools used to collect such information are Volatility and HBGary. The former is a free tool and will be referenced in ...
     14  +29 2014 aug 17expert witness testimonyOne of a computer forensic expert's most important functions is to serve as a testifying expert in court. This series of articles is intended to ...
     14  +87 2014 jul 19network forensic methodologyTopics | Network Forensics - DFI NewsNetwork Forensics Makes an Impact at the Army's NIE ... media requires a different mind-set to traditional investigative and current forensic methodologies .
     15  ~ 2014 sep 08large sms collectionPreservation of SMS Messages : A Mobile Device eDiscovery Guide Despite this increasingly large amount of information, marooned mobile ... Early efforts at preserving and producing SMS messages from flip ...
     15  -3 2014 aug 23ufed physical pro cellbriteCellebrite Releases UFED Physical Analyzer, Version 2.0 - DFI NewsUFED Physical Analyzer – A revamped version of Cellebrite's parsing tool ... 2.0 is available now at no cost to current UFED Physical Pro users.
     15  ~ 2014 aug 22malware attack on wordpressUp to 50,000 WordPress Users Hit by MailPoet Malware AttackDaniel Cid, CTO and founder of Sucuri, revealed the news in a blog post, after spotting a spike in WordPress sites infected with malware .
     15  ~ 2014 aug 06oxygen forensic suite deutschOxygen Forensic Suite 2011 v.3.5 Introduces New FeaturesThe release of Oxygen Forensic Suite 2011 v.3.5 adds the ability to perform data ... Added German translation of the program interface. General ...
     15  -1 2014 jul 29computer forensic statementQuality Assurance Practices for Computer Forensics : Part 2 - DFI NewsIf a Computer Forensics unit is part of an accredited laboratory, the existing ... 1.2 Agency/ Computer Forensics Unit Mission Statement .
     16  -3 2014 sep 29bit’s 2nd annual world congress of forensics wcf 2011BIT's 2nd Annual World Congress of Forensics - DFI NewsBIT's 2nd Annual World Congress of Forensics ... The WCF welcomed many forensic practitioners with a keen interest in international cooperation and the exchange of knowledge in many ... www.bitlifesciences.com/ wcf2011 .
     18  +22 2014 aug 24capture ram from networkMemory Forensics: Where to Start - DFI NewsList of running processes at the time of RAM capture . ... This authentication is used to access e-mail, social networking accounts, or their home's ...
     18  ~ 2014 aug 20wordpress malware attack
     19  +7 2014 aug 24ufed physical proWith the latest iteration of UFED Physical Analyzer 2.0, law enforcement ... 2.0 is available now at no cost to current UFED Physical Pro users.
     20  -10 2014 aug 22expert witness reportPart 5 of our series on How to Be an Effective Expert Witness in Court. ... If the expert is going to testify in federal court a written report is ...
     20  +81 2014 aug 20what is digital forensicsThe resource for digital forensic professionals. Subscribe to DFI News All ... Cyber Forensics: Taking Tips from a Detective's Playbook. August 18, 2014 3:50 pm ...
     20  -13 2014 jul 31social media controllingControlling Social Media Rumors During a Disaster or Terrorist AttackA study on the use of social media in three major incidents, including the 2008 Mumbai terrorist attack, by Dr. Onook Oh, of Warwick Business ...
     20  ~ 2014 jul 18sms messaging articlesCompany Profile Search · Log In · Register. Advertisement. Articles ... Early efforts at preserving and producing SMS messages from flip phones ...
     21  +8 2014 aug 22digital forensics jobsStarting A Career in Digital Forensics : Part 1 - DFI News... education and training is necessary to work in digital forensics ? ... an individual may initially have to seek employment in another capacity ...
     21  +4 2014 jul 28us bank databaseSpy Agencies to Get Access to US Bank Transactions DatabaseIf the federal government has its way, United States intelligence agencies will soon be able to sift through a massive database containing ...
     21  -2 2014 jul 22addonics disk duplicatorAddonics Announces Hard Drive Duplicator - DFI NewsAddonics Technologies announces the Addonics 1:11 HDD (Hard Disk Drive ) Duplicator , which can copy up to 11 target drives from a single ...
     22  -8 2014 sep 29omnipeek network analyzerWildPackets Unveils Newest OmniPeek Network Analyzer - DFI NewsWildPackets, Inc. announced the newest version of the OmniPeek network analyzer , the popular packet analyzer solution used for network ...
     22  -1 2014 aug 31blackberry data recoveryChip-Off Data Recovery for BlackBerry Devices - DFI NewsFTS has developed an advanced data extraction method which is able to bypass encryption and retrieve the physical memory from BlackBerry  ...
     23  +32 2014 jul 29computer forensic grantsThe 2-Year Digital Forensics Degree - DFI NewsGrants also helped develop Cypress' computer forensics program; specifically, Perkins funding —via the Carl Perkins Vocational and Technical ...
     23  +32 2014 jul 25electromagnet biometric logThe Forensic Significance of Handwriting Biometrics - DFI NewsUsing an active electromagnetic digitizing pen and tablet or stylus (pen) and pressure-sensitive pad, users sign their name to an electronic ...
     23  ~ 2014 jul 18extract info blackberry died6 Persistent Challenges with Smartphone Forensics - DFI NewsObviously, it is easy to extract data from a smartphone with no passcode. ... The BlackBerry , for example, requires codes to lock the device and then encrypt the content. .... Computer Forensics Key in Hot Car Child Death Case.
     24  +34 2014 aug 28federal rules civil procedureNew Federal Rules of Civil Procedure That Apply To Expert WitnessesRule 26 of the Federal Rules of Civil Procedure was amended in 2010, and as of December 1, 2010, the changes to the rule have significantly ...
     24  ~ 2014 aug 07encrypted call iphoneiPhone App Makes Free, Encrypted Calls - DFI NewsIf you're making a phone call with your iPhone , you used to have two ... in on your conversations, or pay for pricey voice encryption software.
     25  +76 2014 aug 27copper conductore closure systemsUSB Forensic Pouch - DFI NewsLarge, non-glare window made of double layer conductive mesh for maximum
     26  -9 2014 sep 28how to detect a rootkitUnderstanding Rootkits : Using Memory Dump Analysis for Rootkit Every rootkit employs a wide range of masquerading techniques to prevent its detection . Anti-virus and anti-malware tools must perform what is ...
     26  -2 2014 sep 01mobile phone forensic productsProduct Categories | Mobile Device Forensics Hardware - DFI News... Product Releases |. The Sherlock Lite is a portable solution for computer forensics . ... Mobile Phone Examiner Plus 5.3. April 18, 2013 7:08 ...
     26  +8 2014 aug 04quicken data filesQuicken : Deleted Data Has Hidden Traces - DFI NewsWhen Quicken files become subject to legal discovery or a tax audit, providing Quicken files to opposing counsel or the IRS could result in ...
     27  +74 2014 sep 11digital intelligenceDigital Intelligence , Inc. - DFI NewsAt Digital Intelligence , we know the challenges that current and future technologies impose on law enforcement and corporate organizations. We build products ...
     27  +74 2014 aug 20prepaid supplier directoryDon't Get Burned by Prepaid Phones - DFI NewsPrepaid phones have been a problem for some time, and continue to be a problem for law enforcement in particular.
     27  ~ 2014 aug 08switch privat logniThe Switch to Private Sector Digital Forensics - DFI NewsThe private sector examiner can be expected to provide evidence to private attorneys, ... The Switch to Private Sector Digital Forensics .... You may login with either your assigned username or your e-mail address. Password *.
     27  +13 2014 aug 01best forensic software toolsValidation of Forensic Tools and Software : A Quick Guide for the Tools and software for digital forensic analysis should be validated ... a good validation process is a key requirement for any digital forensic  ...
     28  -14 2014 sep 20oldappsNo Forensics for Old Apps - DFI NewsNo Forensics for Old Apps . Fri, 05/16/2014 - 10:45am. Get today's news and top headlines for digital forensics professionals - Sign up now! Apps, not just ...
     28  ~ 2014 aug 31own search engineNSA Increases Interagency Cooperation with Own Search EngineAccording to newly published documents, the National Security Agency has built a “Google-like” search interface for its vast database of ...
     28  +1 2014 aug 02forensics software toolsTools and software for digital forensic analysis should be validated quarterly. With the field of digital forensics growing at an almost warp-like ...
     29  +72 2014 aug 14digital and computer forensicsDigital forensic science is not a matter of recovering a file that proves somebody's guilt; it is about wading through hundreds of thousands, possibly millions, of a ...
     29  ~ 2014 aug 08micro systemation xryTest Results for Mobile Device Acquisition Tool: Micro Systemation This document reports the results from testing Micro Systemation XRY version 6.3 .1 against the Smart Phone Tool Test Assertions and Test ...
     29  +2 2014 aug 06social network forensicCommon tactics of social media extortionists include relating to a service member's ... brought a network forensics team to the technology-centric field evaluation.
     30  -16 2014 sep 11passware kit forensicPassware Kit Forensic v11 recovers Mac OS Passwords - DFI NewsPassware, Inc. announces that Passware Kit Forensic v11—a new version of its flagship product—recovers Mac OS user login passwords from ...
     30  ~ 2014 sep 01applane cce software costHowever, cost and accessibility typically interfere with many would-be ... Both Spokane Falls' and Cypress' programs use a hybrid of ...
     30  ~ 2014 aug 24audio forensic expert witnessProfile: Ed Primeau, Audio Forensic Expert - DFI NewsEd Primeau, a Michigan-based audio forensic expert, plays an ... Today we'll discuss the challenges of testifying as an expert witness . As you ...
     31  ~ 2014 jul 31global sms databasePreservation of SMS Messages: A Mobile Device eDiscovery Guide In 2011, only 17% of the global population was without at least a .... the SMS database limit is reached, whereupon no additional messages can ...
     32  -12 2014 sep 16smsscriptAndroid SMS Script Update and a Bit of Light HousekeepingDuring recent research into Android SQLite databases (eg sms), Mari DeGrazia discovered a bug in the sms-grep.pl script. Mari's test data was ...
     32  -6 2014 aug 31wordpress comments malware hostingUse WordPress for Blogging Not Malware Distribution - DFI NewsUse WordPress for Blogging Not Malware Distribution. Tue, 03/25/2014 ... Interestingly, none of the phishing sites were hosted on WordPress .com, a a large blog- hosting service run by Automattic. .... 1 comment · 4 weeks ago.
     32  -6 2014 aug 31text message extractionData Extraction from a Physical Dump - DFI NewsIt is quite easy to identify a couple of SMS text messages within the extracted Unicode or ASCII text format by scrolling through that extracted  ...
     33  +68 2014 sep 29witness v35Deployable Device Seizure v3.5 Released - DFI NewsDeployable Device Seizure v3.5 Released. Wed, 04/18/2012 .... Today we'll discuss the challenges of testifying as an expert witness . As you ...
     33  -11 2014 aug 14oxygen forensic suiteOxygen Forensic Suite 2013 - DFI NewsOxygen Forensic Suite 2013 brings in some greatly extended global search capabilities, offers simpler navigation, and becomes easier to use ...
     34  -19 2014 aug 16buy an adwareAdware Vendors Buy Chrome Extensions to Send Ad ... - DFI NewsMalware and adware vendors have caught wind of this and have started showing up at the doors of extension authors, looking to buy their ...
     35  -2 2014 sep 27google analytics utmz cookie phpWith the advent of Google Analytics (GA) cookies , that has changed. ... The individual parts of the __utma , __utmb, __utmc, __utmz cookies ..... and implemented various projects in C++, Perl, Ruby, PHP , HTML, and Bash.
     35  +26 2014 sep 26it is infeasibleIt Is Infeasible to Alter A Hash Value to Hide It from an ExaminerIt is infeasible , if not impossible, to create a hash value of a contraband image, and have a known hash set filter it out of a case, in an attempt to ...
     35  ~ 2014 aug 02free call for iphoneiPhone App Makes Free , Encrypted Calls - DFI NewsIf you're making a phone call with your iPhone , you used to have two options: Accept the notion that any wiretapper, hacker or spook can listen ...
     36  +36 2014 jul 20forms for forensics infoMozilla Firefox Forensics : Part 3 - DFI NewsThe file only contains one table, “moz_formhistory,” but it stores a wealth of forensic information . All historical data for every form that a user ...
     37  +11 2014 jul 29computer news articlesJuly 25, 2014 8:51 am | Articles | Comments ... Computer Forensics is the methodical series of procedures and techniques used for procuring evidence from ...
     38  ~ 2014 sep 296000 optin subscribers in 5 days blackhatTopics | Encryption - DFI NewsAbout a week before this issue went to press, we were treated to a veritable media frenzy
     38  +63 2014 sep 22google analytics cookiesIt offers an in-depth look at the internal workings of Google Analytics ™ cookies , and compares and contrasts them with standard HTTP cookies .
     38  -13 2014 sep 22passware kitPassware Kit Forensic v.12.5 - DFI NewsPassware Kit Forensic v.12.5 can now recognize hard disk images and containers, such as TrueCrypt, BitLocker, PGP, etc. during a computer ...
     38  -10 2014 aug 22quicken file recovery
     39  ~ 2014 sep 23government withholding infoYahoo Threatened with $250,000-a-day Fine for Withholding InfoYahoo says the government threatened to fine the company $250000 a day if it did not comply with demands to go along with an expansion of ...
     39  +33 2014 sep 14greek domain namesThis Domain Name is Greek to Me: An Introduction to ... - DFI NewsAn Analogy… Consider a telephone directory for a city such as New York. The peoples' names and addresses are linked to their respective ...
     40  ~ 2014 aug 03failed computer forensic investigationsValidation of Forensic Tools and Software: A Quick Guide for the Tools and software for digital forensic analysis should be validated quarterly.
     40  +24 2014 aug 01consulting expert witnessPart 4 of our series on How to Be an Effective Expert Witness in Court. ... Under the applicable rules, the identity of a consulting expert did not ...
     41  ~ 2014 sep 15most popular android appsSSL Vulnerabilities Found in Most Popular Android Apps - DFI NewsMan-in-the-middle (MITM) attacks are “wreaking havoc” on Android users because over two-thirds of the most popular apps on Google Play ...
     42  -5 2014 aug 08flash mob ddosTopics | DDoS - DFI NewsNSFOCUS has released its DDoS Threat Report 2013, which details attack trends .... more like legitimate ' flash mobs ' in an effort to elude automated defenses.".
     42  +59 2014 jul 31flash drive duplicatorFlash Drive Duplicator - DFI NewsStarTech.com has announced the release of a portable USB Flash Drive Duplicator , which enables users to simultaneously clone a single flash ...
     43  +7 2014 aug 29hard drive foensicsForensic Insight into Solid State Drives - DFI NewsSSDs are a game changer for forensic investigators, but insight into their ... Hard drives use magnetic spinning platters, while SSDs use flash ...
     43  +1 2014 aug 20encase forensic softwareGuidance Software Announces EnCase Forensic Version 7Guidance Software announced it will deliver the newest version of its flagship digital forensic solution— EnCase Forensic version 7—on June ...
     43  +22 2014 aug 16prefetch data deletedDecoding Prefetch Files for Forensic Purposes: Part 1 - DFI NewsThe prefetch files are considered data files. ... If the prefetch file is deleted the run count will start over with the creation of a new prefetch file.
     43  -7 2014 jul 21encase forensics software
     44  +1 2014 aug 22ace labels punycodeThe ccTLD will be the leftmost label in the domain name. ... and ASCII Compatible Encoding ( ACE ) or punycode .5 ACE is used by DNS and ...
     44  ~ 2014 aug 13password strength meterEbay's Password Strength Meter is Misleading - DFI NewsEbay's Password Strength Meter is Misleading. Fri, 05/23/2014 - 10:49am. Dan Goodin, Ars Technica. Get today's news and top headlines for digital forensics ...
     46  ~ 2014 sep 23blackhat toolsSynergy of Hackers and Tools at the Black Hat Arsenal - DFI NewsBlack Hat USA 2014 recently welcomed more than 9000 of the most renowned security experts. Tucked away from the glamour of the vendor ...
     46  -23 2014 aug 26paraben device seizureDevice Seizure 6.6 - DFI News“This version of Device Seizure feels like a whole new beast,” stated Amber Schroader, CEO of Paraben Corporation. “We have added new ...
     48  +27 2014 sep 17federal rules of civil procedure
     48  -9 2014 aug 19hard drive forensics
    1 2 of 3 pages