When I started my pilgrimage into mobile forensics, I did so with the goal of providing the law enforcement community with the tools and training that would assist investigators in extracting relevant data from cell phones.
The catastrophic Heartbleed security bug that has already bitten Yahoo Mail, the Canada Revenue...
Cellebrite has released an update to its Universal Forensic Extraction Device (UFED) software...
Passwords, gestures and fingerprint scans are all helpful ways to keep a thief from unlocking and using a cell phone or tablet. Cybersecurity researchers from the Georgia Institute of Technology have gone a step further.
A series of bots have invaded the Android version of dating app Tinder, and are spreading dangerous downloads after luring users with tempting profiles and pictures stolen from an Arizona-based photography studio.
Secure mobile communications underpin our society and through mobile phones, tablets and laptops we have become online consumers. The security of mobile transactions is obscure to most people but is absolutely essential if we are to stay protected from malicious online attacks, fraud and theft.
Vendors and operating systems can vary widely, particularly with Android, but also even within iOS and BlackBerry user groups. More than 40 iOS versions are commercially available, and are spread among six different iPhones, five iPads, and five iPod Touch devices.
Mobile Point of Sale (MPOS) devices can be easily hacked, leaving banks, retailers and millions of customers exposed to serious fraud around the world, global information security firm MWR InfoSecurity has revealed at the SyScan security conference in Singapore.
I recently encountered a botnet targeting Android smartphone users who bank at financial institutions in the Middle East. The crude yet remarkably effective mobile bot that powers this whole operation comes disguised as one of several online banking apps, has infected more than 2,700 phones, and has intercepted at least 28,000 text messages.
Police in Wisconsin have at least two devices that secretly track cellphone locations in real time to target suspects or missing persons, according to a published report.
If Malaysian flight 370 is ever recovered, could draft text messages, videos, and other electronically stored information retrieved from passenger’s mobile phones and other digital devices help tell the story of the doomed airliner’s fate?
In a 13-page order filed in the United States District Court for the District of Columbia filed Wednesday, Judge John Facciola denied the government’s request for a warrant to search the iPhone of alleged ricin cook, Daniel Harry Milzman’s on the grounds that it was overbroad.
Stingray is a US law enforcement spoof cell tower used to track the location of mobile phones. Snoopy, a project conducted by London-based Sensepost Research Labs that does similar and much more with any WIFI-enabled device, has gone airborne — mounted on a drone it can hover above a target area and trick mobile devices into connecting: a form of flying MITM attack.
Security researchers said they have uncovered bugs in Google's Android operating system that could allow malicious apps to send vulnerable devices into a spiral of endlessly looping crashes and possibly delete all data stored on them.
Oscar Pistorius' girlfriend told the athlete she was sometimes scared of him and complained about what she described as his short temper and jealousy in the weeks before he killed her, according to phone messages revealed at the Olympian's murder trial.
Radio Tactics has signed a partnership agreement with Wynyard Group, a New Zealand based provider of critical threat assessment and advanced crime analytics software.
There are so many applications and so much data on mobile devices that trying to ask the right question can sometimes be tricky.
Perhaps because of a false belief that deleted text messages stay buried, many people rely on text messaging to carry out their dirty work, such as stealing trade secrets and other intellectual property, violating non-compete agreements and committing fraud.
Accessing all the data in a single smartphone can be as painstaking as processing thousands of fingerprints at a crime scene, but rather than isolating the prints you know from those you don’t, thousands of irrelevant text messages or call logs can simply muddy the waters of an investigation.
Police investigating a burglary in Colorado are searching for a man who they believe snapped a selfie with an iPad reported stolen from a gymnastics studio.
Not only does data storage vary from device to device and OS to OS, but devices may also be passcode-protected and/or encrypted. iPhone passcodes fall into two categories: simple and complex. A mobile data extraction tool should be able to reveal a simple passcode automatically for most devices.
Police in Florida have offered a startling excuse for having used a controversial “stingray” cell phone tracking gadget 200 times without ever telling a judge: the device’s manufacturer made them sign a non-disclosure agreement that they say prevented them from telling the courts.
The Texas Court of Criminal Appeals has ruled that law enforcement officials do need a warrant to search an arrested person's cell phone after they've been jailed. The ruling did not decide whether it is legal or not for police to search a suspect's phone at theincidence of arrest, which is currently a hotly contested subject. The Supreme Court is set to decide that matter later this year.
NIST's National Cybersecurity Center of Excellence has proposed two new cybersecurity building blocks, one to help organizations develop capabilities for attribute-based access control, and the other to help address enterprise security issues that result from the use of mobile devices to access company resources.
Cellebrite, a leading provider of mobile forensic and mobile data transfer solutions, shares its industry forecast of top trends shaping mobile forensics this year. Cellebrite surveyed its customer base and conducted interviews with leading mobile forensic experts and analysts spanning the industry.
Magnet Forensics has released Internet Evidence Finder™ (IEF) v6.3. Key release updates include enhanced tools for investigation of pictures; additional support for volume shadow copies, support for an expanded range of mobile chat and social networking artifacts; as well as support for analysis of Kindle Fire tablets.
Android is one of the most open, versatile, and customizable mobile operating systems out there. Android is a Linux-based operating system with market share — 79.70 percent in smart phones. Android is a software stack for mobile devices that includes an operating system, middleware and key applications.
Like everything else on the iPhone, the critical crypto flaw announced in iOS 7 turns out to be a study in simplicity and elegant design: a single spurious “goto” in one part of Apple’s authentication code that accidentally bypasses the rest of it.
- Page 1