Mobile Devices
Subscribe to Mobile Devices

The Lead

The Forensic Snake: Using Python to Squeeze the Mobile Device

April 16, 2014 8:46 am | by Lee Reiber | Blogs | Comments

When I started my pilgrimage into mobile forensics, I did so with the goal of providing the law enforcement community with the tools and training that would assist investigators in extracting relevant data from cell phones.       

Heartbleed Bug Affects Android Phones, Other Devices

April 15, 2014 10:20 am | by Dan Goodin, Ars Technica | News | Comments

The catastrophic Heartbleed security bug that has already bitten Yahoo Mail, the Canada Revenue...

UFED Permission Management

April 8, 2014 4:10 pm | Product Releases | Comments

Cellebrite has released an update to its Universal Forensic Extraction Device (UFED) software...

Manual Mobile Evidence Collection

April 8, 2014 8:17 am | Product Releases | Comments

The Fernico ZRT 3 with OCR (Optical Character Recognition) is a go-to system for the manual...

View Sample


Personal Touch Makes Mobile Devices More Secure

April 7, 2014 11:31 am | by Georgia Institute of Technology | News | Comments

Passwords, gestures and fingerprint scans are all helpful ways to keep a thief from unlocking and using a cell phone or tablet. Cybersecurity researchers from the Georgia Institute of Technology have gone a step further.         

Botnets Hide in Mobile Dating App

April 7, 2014 11:15 am | by Infosecurity | News | Comments

A series of bots have invaded the Android version of dating app Tinder, and are spreading dangerous downloads after luring users with tempting profiles and pictures stolen from an Arizona-based photography studio.           

Quantum Cryptography for Mobile Phones

April 4, 2014 10:03 am | by Univ. of Bristol | News | Comments

Secure mobile communications underpin our society and through mobile phones, tablets and laptops we have become online consumers. The security of mobile transactions is obscure to most people but is absolutely essential if we are to stay protected from malicious online attacks, fraud and theft.


A Smartphone is Never Just a Smartphone

April 4, 2014 9:09 am | by Ronen Engler and Christa M. Miller | Articles | Comments

Vendors and operating systems can vary widely, particularly with Android, but also even within iOS and BlackBerry user groups. More than 40 iOS versions are commercially available, and are spread among six different iPhones, five iPads, and five iPod Touch devices.

Mobile POS Devices are Vulnerable to Attack

April 3, 2014 4:37 pm | by MWR InfoSecurity | News | Comments

Mobile Point of Sale (MPOS) devices can be easily hacked, leaving banks, retailers and millions of customers exposed to serious fraud around the world, global information security firm MWR InfoSecurity has revealed at the SyScan security conference in Singapore.

Android Botnet Targets Middle East Banks

April 3, 2014 9:27 am | by Editor | Blogs | Comments

I recently encountered a botnet targeting Android smartphone users who bank at financial institutions in the Middle East. The crude yet remarkably effective mobile bot that powers this whole operation comes disguised as one of several online banking apps, has infected more than 2,700 phones, and has intercepted at least 28,000 text messages.  

Wisconsin Police to Secretly Track Cellphone Locations

April 1, 2014 10:03 am | by Associated Press | News | Comments

Police in Wisconsin have at least two devices that secretly track cellphone locations in real time to target suspects or missing persons, according to a published report.                       

Recovering Data from Malaysian Flight 370 Passenger's Mobile Devices

March 31, 2014 9:35 am | News | Comments

If Malaysian flight 370 is ever recovered, could draft text messages, videos, and other electronically stored information retrieved from passenger’s mobile phones and other digital devices help tell the story of the doomed airliner’s fate?


Judge Denies Government Request to Search iPhone

March 27, 2014 10:09 am | by Cyrus Farivar, Ars Technica | News | Comments

In a 13-page order filed in the United States District Court for the District of Columbia filed Wednesday, Judge John Facciola denied the government’s request for a warrant to search the iPhone of alleged ricin cook, Daniel Harry Milzman’s on the grounds that it was overbroad.

Snoopy: A Non-NSA Flying Stingray

March 26, 2014 12:34 pm | by Infosecurity | News | Comments

Stingray is a US law enforcement spoof cell tower used to track the location of mobile phones. Snoopy, a project conducted by London-based Sensepost Research Labs that does similar and much more with any WIFI-enabled device, has gone airborne — mounted on a drone it can hover above a target area and trick mobile devices into connecting: a form of flying MITM attack.

Malicious Apps Can Make Android Phones Useless

March 26, 2014 12:10 pm | by Dan Goodin, Ars Technica | News | Comments

Security researchers said they have uncovered bugs in Google's Android operating system that could allow malicious apps to send vulnerable devices into a spiral of endlessly looping crashes and possibly delete all data stored on them.     

Cell Phone Messages Examined in Pistorius Trial

March 24, 2014 11:00 am | by Carley Petesh and Christopher Torchia, Associated Press | News | Comments

Oscar Pistorius' girlfriend told the athlete she was sometimes scared of him and complained about what she described as his short temper and jealousy in the weeks before he killed her, according to phone messages revealed at the Olympian's murder trial.

Radio Tactics Signs Global Partnership with Wynyard Group

March 17, 2014 3:36 pm | by Radio Tactics | News | Comments

Radio Tactics has signed a partnership agreement with Wynyard Group, a New Zealand based provider of critical threat assessment and advanced crime analytics software.                        


The Three A's of Mobile Device Preservation

March 17, 2014 9:35 am | by Peter Coons, D4 eDiscovery | News | Comments

There are so many applications and so much data on mobile devices that trying to ask the right question can sometimes be tricky.                                   

Think Deleted Text Messages are Gone Forever? Think Again

March 12, 2014 10:11 am | by Tom Kaneshige, CIO | News | Comments

Perhaps because of a false belief that deleted text messages stay buried, many people rely on text messaging to carry out their dirty work, such as stealing trade secrets and other intellectual property, violating non-compete agreements and committing fraud.

Three Questions to Ask about Mobile Device Evidence

March 12, 2014 9:44 am | by Christa Miller, | News | Comments

Accessing all the data in a single smartphone can be as painstaking as processing thousands of fingerprints at a crime scene, but rather than isolating the prints you know from those you don’t, thousands of irrelevant text messages or call logs can simply muddy the waters of an investigation.  

Police Investigate Possible Selfie on Stolen iPad

March 10, 2014 11:08 am | by Associated Press | News | Comments

Police investigating a burglary in Colorado are searching for a man who they believe snapped a selfie with an iPad reported stolen from a gymnastics studio.                           

Challenges in Smartphone Forensics: Passwords and Encryption

March 10, 2014 6:20 am | by Ronen Engler and Christa M. Miller | Cellebrite | Articles | Comments

Not only does data storage vary from device to device and OS to OS, but devices may also be passcode-protected and/or encrypted. iPhone passcodes fall into two categories: simple and complex. A mobile data extraction tool should be able to reveal a simple passcode automatically for most devices.

Florida Cops' Secret Weapon: Warrantless Cell Phone Tracking

March 3, 2014 9:45 am | by Kim Zetter, Wired | News | Comments

Police in Florida have offered a startling excuse for having used a controversial “stingray” cell phone tracking gadget 200 times without ever telling a judge: the device’s manufacturer made them sign a non-disclosure agreement that they say prevented them from telling the courts.

Texas Appeals Court Says Police Can't Search Someone's Phone after being Jailed

February 28, 2014 9:34 am | by Megan Geuss, Ars Technica | News | Comments

The Texas Court of Criminal Appeals has ruled that law enforcement officials do need a warrant to search an arrested person's cell phone after they've been jailed. The ruling did not decide whether it is legal or not for police to search a suspect's phone at theincidence of arrest, which is currently a hotly contested subject. The Supreme Court is set to decide that matter later this year.

NIST Presents Building Blocks for Mobile Security

February 28, 2014 9:12 am | by Editor | Blogs | Comments

NIST's National Cybersecurity Center of Excellence has proposed two new cybersecurity building blocks, one to help organizations develop capabilities for attribute-based access control, and the other to help address enterprise security issues that result from the use of mobile devices to access company resources.

Cellebrite Reveals Top Trends Shaping Mobile Forensics

February 27, 2014 3:11 pm | by Cellebrite | News | Comments

Cellebrite, a leading provider of mobile forensic and mobile data transfer solutions, shares its industry forecast of top trends shaping mobile forensics this year. Cellebrite surveyed its customer base and conducted interviews with leading mobile forensic experts and analysts spanning the industry.

Internet Evidence Finder v6.3

February 26, 2014 2:54 pm | Magnet Forensics, Inc. (formerly JADsoftware) | Product Releases | Comments

Magnet Forensics has released Internet Evidence Finder™ (IEF) v6.3. Key release updates include enhanced tools for investigation of pictures; additional support for volume shadow copies, support for an expanded range of mobile chat and social networking artifacts; as well as support for analysis of Kindle Fire tablets.

Android Architecture and Forensics

February 24, 2014 3:04 pm | by Mohit Rawat | Blogs | Comments

Android is one of the most open, versatile, and customizable mobile operating systems out there. Android is a Linux-based operating system with market share — 79.70 percent in smart phones. Android is a software stack for mobile devices that includes an operating system, middleware and key applications.

Behind iPhone's Critical Security Bug, a Single Bad 'Goto'

February 24, 2014 8:54 am | by Kevin Poulsen, Wired | News | Comments

Like everything else on the iPhone, the critical crypto flaw announced in iOS 7 turns out to be a study in simplicity and elegant design: a single spurious “goto” in one part of Apple’s authentication code that accidentally bypasses the rest of it.

You may login with either your assigned username or your e-mail address.
The password field is case sensitive.