Advertisement
Mobile Devices
Subscribe to Mobile Devices

The Lead

I put together a python script that parses out several plist files related to Safari Internet History. Since the iPhone also uses Safari, I decided to expand the script to parse some iPhone Safari artifacts.

Safari and iPhone Internet History Parser

July 23, 2014 9:32 am | by Mari DeGrazia | Blogs | Comments

I put together a python script that parses out several plist files related to Safari Internet History. Since the iPhone also uses Safari, I decided to expand the script to parse some iPhone Safari artifacts.            

Forensic Scientist Identifies 'Back Doors' Running on iOS

July 21, 2014 2:25 pm | by Jason O'Grady | Blogs | Comments

Forensic scientist and author Jonathan Zdziarski has posted the slides from his talk at the...

Android Has Some Words with Monkey

July 18, 2014 8:03 am | by Editor | Blogs | Comments

The recent NIST Mobile Forensics Webcast and SANS FOR585 poster got monkey thinking about using...

Digging for Data, Finding Evidence in Third-Party Applications

July 16, 2014 8:13 am | by Heather Mahalik and Cesar Quezada | Articles | Comments

With the global smartphone market expected to total 1.75 billion users this year, it is rare for...

View Sample

SUBSCRIBE TO FREE DFI News EMAIL NEWSLETTER

Digital Crime-fighters Face Technical Challenges with Cloud Computing

July 15, 2014 3:55 pm | by NIST | News | Comments

The National Institute of Standards and Technology has issued for public review and comment a draft report summarizing 65 challenges that cloud computing poses to forensics investigators who uncover, gather, examine and interpret digital evidence to help solve crimes.

P2 Commander 3.6

July 11, 2014 4:06 pm | Paraben Corporation | Product Releases | Comments

Paraben's P2 Commander v3.6 adds the ability to perform forensic analysis of mobile device acquisitions from Device Seizure. This first step in integrating Paraben’s advanced computer forensics technology with its mobile forensics capabilities offers examiners more power in their mobile forensic acquisitions.

Identifying Android Device Owners

July 11, 2014 10:24 am | by John Lehr | Blogs | Comments

I've seen a trend in recovered stolen devices over the past few years: the bad guys are rapidly restoring devices to factory settings to prevent them from being tracked by the owner or law enforcement. That leaves me with a problem, though: how do I determine the owner of a device that has been restored?

Advertisement

Personal Data Recovered after Android's Factory Reset

July 8, 2014 11:04 am | by Seth Rosenblatt, CNet | News | Comments

A new study from security software vendor Avast calls into question the effectiveness of Android's factory reset option, which many people have relied upon to delete personal data from their old smartphones before reselling or making a charitable donation with the old device.

Device Seizure 6.6

July 8, 2014 8:51 am | Paraben Corporation | Product Releases | Comments

Device Seizure v6.66 has been released adding support for 100 percent of iOS devices and over 96 percent of Android devices. The release also adds physical support for Android 4.1.x, deleted message recovery of Symbian OS 7.x-9.x, smartphone app parsing and much more. 

Smartphones Can Still Be Searched by Border Cops

July 7, 2014 9:57 am | News | Comments

The Supreme Court released a landmark unanimous ruling last Wednesday limiting the ability of police officers to search a suspect's cellphone. But don't expect the Supreme Court's limitations to impact all law enforcement, because, as Aaron Sankin detailed on the Daily Dot, the United States Customs and Border Protection (CBP) still don't need to consult with a judge before browsing through your smartphone.

The Service You Can’t Refuse: A Secluded HijackRAT

July 2, 2014 1:05 pm | by Jinjian Zhai | Blogs | Comments

In Android world, sometimes you can’t stop malware from “serving” you, especially when the “service” is actually a malicious Android class running in the background and controlled by a remote access tool (RAT). Recently, FireEye mobile security researchers have discovered such a malware that pretends to be a “Google Service Framework” and kills an anti-virus application as well as takes other malicious actions.

Supreme Court Cites NIST Mobile Forensics Guide in Ruling on Cell Phone Searches

July 2, 2014 12:20 pm | by NIST | News | Comments

In considering the question of cell phone searches by police without a warrant, the Supreme Court ruling in Riley v California had to mesh established policy on search warrants together with an understanding of cell phone technology. To help with that challenge, the justices turned to a variety of sources, among them the NIST Guidelines on Mobile Device Forensics

Advertisement

The Frontier of Cloud Forensics

July 1, 2014 11:23 am | by William Jackson, GCN | News | Comments

Cloud computing helps to make data more accessible, but the same technologies that make it readily available — on-demand provisioning, reprovisioning and virtual environments — also can obscure it. This is creating new challenges for digital forensics, complicating incident response and criminal and civil investigations into incidents and data in the cloud.

Getting the most out of Smartphone Forensic Exams

June 30, 2014 4:47 am | by Editor | SANS Institute | Blogs | Comments

There is one certain thing in the DFIR field, and that is that there are far more facts, details and artifacts to remember than can easily be retained in any forensic examiner's brain. SANS has produced an incredibly helpful array of Posters and Cheat Sheets for DFIR in order to assist examiners with those tidbits of information than can help to jumpstart their forensics exams and or intrusion and incident response investigations.

In an emphatic defense of privacy in the digital age, a unanimous Supreme Court ruled Wednesday that police generally may not search the cellphones of people they arrest without first getting search warrants.

Police Need a Warrant to Search Cell Phones, Justices Say

June 25, 2014 3:24 pm | by Mark Sherman, Associated Press | News | Comments

In an emphatic defense of privacy in the digital age, a unanimous Supreme Court ruled Wednesday that police generally may not search the cellphones of people they arrest without first getting search warrants.            

Mobile Data Drives a Big Data World

June 25, 2014 8:27 am | by Lee Reiber | AccessData Group | Articles | Comments

Today’s world is becoming more and more mobile every day. In fact, 91% of all people own a mobile device and 56% own some type of smart device. It is no surprise that today there are more mobile devices on the earth than there are people! Equally impressive is that the amount of data we consume is becoming increasingly focused on mobile devices.

Time is very valuable in the age of digital device examinations, but obtaining critical data and allowing for full examinations if needed is mandatory.

The Time Argument, Mobile Forensics

June 24, 2014 4:23 pm | by Lee Reiber | Blogs | Comments

In the beginning there was a bit. The bit turned into a byte. That byte rapidly turned into a kilo. The kilo turned into a mega, the mega into a giga, and the giga into what we know today as a tera. Sounds like an interesting name game, but truthfully each name means extra time to the forensic examiner, extra data, and most of the time, extra headaches.

Advertisement
InfoSec teams should expand their rapid incident detection and response capabilities to mobile devices that have access to sensitive data.

Mobile Security Needs Incident Readiness

June 24, 2014 11:47 am | by AccessData | News | Comments

AccessData and Gigaom Research have released a report on the growing complexities of mobile security and the limitations of “preventive, policy-driven” solutions that are not designed to detect and respond to mobile security incidents that bypass defenses.

Investigators, lawyers and forensic analysts who handle child-pornography cases

Haunted Digital Investigations

June 19, 2014 12:40 pm | by Jason Nark, Philadelphia Daily News | News | Comments

No matter what they do to decompress, the investigators, lawyers and forensic analysts who handle child-pornography cases say they can't outrun the first image they saw on the job, let alone the thousands of other horrors their eyes and ears have witnessed.

Moscow-based Elcomsoft has developed a tool to collect iCloud backup files without knowing a person's Apple ID, a development intended to help law enforcement analyze seized computers.

Forensic Tool Snags iCloud Backups without Apple ID

June 19, 2014 12:11 pm | by Jeremy Kirk, InfoWorld | ElcomSoft Co., Ltd. | News | Comments

Moscow-based Elcomsoft has developed a tool to collect iCloud backup files without knowing a person's Apple ID, a development intended to help law enforcement analyze seized computers.                   

Researchers have discovered a crucial security problem in Google Play, the official Android app store.

Google Play Apps Have Thousands of Secret Keys

June 19, 2014 10:34 am | by Columbia Univ. | News | Comments

Researchers have discovered a crucial security problem in Google Play, the official Android app store. Secret keys in their apps software, similar to usernames/passwords info, can be used by anyone to maliciously steal user data or resources from service providers.

Companies that offer technologies for mobile forensics – the art of extracting digital evidence from smartphones – face a raft of challenges developing tools in today’s breakneck mobile device market.

Mobile Forensics Tools Hammer Out Evidence

June 19, 2014 8:13 am | by William Jackson, GCN | News | Comments

Companies that offer technologies for mobile forensics — the art of extracting digital evidence from smartphones — face a raft of challenges developing tools in today’s breakneck mobile device market.         

Ever since I learned about the threat of “juice-jacking” — the possibility that plugging your mobile device into a random power charging station using a USB cord could jeopardize the data on that device — I’ve been more mindful about bringing a proper pow

Gear to Block 'Juice Jacking' on Your Mobile

June 19, 2014 8:12 am | by Editor | Blogs | Comments

Ever since I learned about the threat of “juice-jacking” — the possibility that plugging your mobile device into a random power charging station using a USB cord could jeopardize the data on that device — I’ve been more mindful about bringing a proper power-outlet charging adapter on my travels.

In this blog post we'll be looking at a new type of malware for Android phones that encrypts important files and demands the user pay a ransom to regain access to their phone.

How to Dissect Android Simplelocker Ransomware

June 18, 2014 9:32 am | by Editor | Blogs | Comments

In this blog post we'll be looking at a new type of malware for Android phones that encrypts important files and demands the user pay a ransom to regain access to their phone.                     

The Time, Man-Power and Logistical Solution to a Mobile Forensic World

June 18, 2014 6:20 am | Webinars

When it comes to today's big data world, we know there are not enough examiners, security analysts and IT professionals that can manage the onslaught of data from mobile devices. Every company now deals with BYOD (Bring your Own Device), company issued devices or in some instances even both. 

Mobile Anti-Forensics

June 17, 2014 8:55 am | by Cory Doctorow, Boing Boing | News | Comments

In Android Anti-forensics: Modifying CyanogenMod, Karl-Johan Karlsson and William Bradley Glisson present a version of the Cyanogenmod alternate operating system for Android devices, modified so that it generates plausible false data to foil forensic analysis by law enforcement.

Can Digital Forensics Keep Up with Smartphone Tech?

June 17, 2014 8:20 am | by William Jackson, GCN | News | Comments

The explosive growth in both the use and capacity of smartphones has led to a sea change in digital forensics, creating technology challenges for the justice and law enforcement communities and raising legal questions that in some cases have gone to the Supreme Court.

Smartphones before the Court: Searchable Wallets or Pocket PCs?

June 16, 2014 10:16 am | by William Jackson, GCN | News | Comments

Smartphones contain a wealth of information that can translate into evidence in civil and criminal court cases, and law enforcement agencies increasingly are mining this data in their investigations. Which raises the question, how much access should police have to the personal data contained on smartphones?

Monkeying around with Windows Phone 8.0

June 13, 2014 9:57 am | by Editor | Blogs | Comments

Currently, there is not much freely available documentation on how Windows Phone 8.0 stores data so it is hoped that the information provided in this post can be used as a stepping stone for further research / possible scripting. Hopefully, analysts will also be able to use this post to help validate any future tool results.

X
You may login with either your assigned username or your e-mail address.
The password field is case sensitive.
Loading