Advertisement
Mobile Devices
Subscribe to Mobile Devices

The Lead

The next generation of Google’s Android operating system, due for release next month, will encrypt data by default for the first time, the company said Thursday, raising yet another barrier to police gaining access to the troves of personal data typically

New Androids to Offer Default Encryption, Blocking Police

September 19, 2014 10:59 am | by Craig Timberg, The Washington Post | News | Comments

The next generation of Google’s Android operating system, due for release next month, will encrypt data by default for the first time, the company said Thursday, raising yet another barrier to police gaining access to the troves of personal data typically kept on smartphones.

You Can Still Pull Data Off a Locked iPhone

September 19, 2014 10:46 am | by Andy Greenberg, Wired | News | Comments

A reminder to iPhone owners cheering Apple’s latest privacy win: Just because Apple will...

15 Million Devices Infected with Mobile Malware

September 10, 2014 10:45 am | by Sara Peters | Blogs | Comments

Fifteen million mobile devices are infected with malware, and most of those run Android,...

Windows Phone 8 and RegRipper

September 10, 2014 10:34 am | by Harlan Carvey | Blogs | Comments

Last week, Cindy Murphy (@cindymurph) sent me some Registry hive files ... from a Windows Phone...

View Sample

SUBSCRIBE TO FREE DFI News EMAIL NEWSLETTER

Cyber Forensics Group Reveals Smartphone App Vulnerabilities

September 9, 2014 12:47 pm | by Univ. of New Haven | News | Comments

Security flaws, breaches of privacy and additional vulnerabilities in chat, dating and other social media apps used by nearly one billion subscribers will be revealed by the University of New Haven's Cyber Forensics Research and Education Group (UNHcFREG).

Device and data security will assume critical significance for companies adopting a bring you own device (BYOD) policy, especially with nearly 50 percent of companies having reported lost mobile handsets in the last year. According to IT services speciali

BYOD Policy Helps Avoid Major Security Breaches

September 3, 2014 11:57 am | by ITC Infotech | News | Comments

Device and data security will assume critical significance for companies adopting a bring you own device (BYOD) policy, especially with nearly 50 percent of companies having reported lost mobile handsets in the last year. According to IT services specialist ITC Infotech, lack of a stringent BYOD policy can lead to the risk of a major security breach.

Mobile forensics has changed the methodology when it comes to offender profiling.  The frequent use of mobile devices has provided investigators with another source for profiling criminal suspects, as well as an insight into their habits and personalities

Mobile Forensics is Changing Offender Profiling

August 28, 2014 4:39 pm | by Yuval Ben-Moshe, Forensic Focus | News | Comments

Mobile forensics has changed the methodology when it comes to offender profiling.  The frequent use of mobile devices has provided investigators with another source for profiling criminal suspects, as well as an insight into their habits and personalities.

Advertisement
Governor Jerry Brown of California on Monday signed into law a measure that requires smartphones sold in California to include smarter antitheft technology, a feature that lawmakers hope will help reduce phone theft.

California Governor Signs Law Requiring 'Kill Switch' on Smartphones

August 26, 2014 10:19 am | by Brian Chen | Blogs | Comments

Governor Jerry Brown of California on Monday signed into law a measure that requires smartphones sold in California to include smarter antitheft technology, a feature that lawmakers hope will help reduce phone theft.         

A team of researchers have identified a weakness believed to exist in Android, Windows and iOS mobile operating systems that could be used to obtain personal information from unsuspecting users. They demonstrated the hack in an Android phone.

Mobile OS Weakness Allows Apps to Steal Personal Information

August 25, 2014 9:47 am | by Sean Nealon, Univ. of California - Riverside | News | Comments

A team of researchers have identified a weakness believed to exist in Android, Windows and iOS mobile operating systems that could be used to obtain personal information from unsuspecting users. They demonstrated the hack in an Android phone.  

One important basic concept to grasp is working with character classes, or sets. A character class performs a search and matches only one character out of a choice of several.

Data Search Character Classes

August 21, 2014 4:01 pm | Articles | Comments

One important basic concept to grasp is working with character classes, or sets. A character class performs a search and matches only one character out of a choice of several.                     

Computer security researchers TU Darmstadt/CASED in Germany and North Carolina State University in USA have developed a modification to the core Android operating system that allows developers and users to plug in new security enhancements. The new Androi

Researchers Develop Framework to Facilitate New Android Security Modules

August 21, 2014 10:41 am | by CASED | News | Comments

Computer security researchers from TU Darmstadt/CASED in Germany and North Carolina State University in USA have developed a modification to the core Android operating system that allows developers and users to plug in new security enhancements. The new Android Security Modules (ASM) framework aims to eliminate the bottleneck that prevents developers and users from taking advantage of new security tools.

Man-in-the-middle (MITM) attacks are “wreaking havoc” on Android users because over two-thirds of the most popular apps on Google Play contain SSL vulnerabilities, according to new research from FireEye.

SSL Vulnerabilities Found in Most Popular Android Apps

August 21, 2014 10:22 am | by Infosecurity Magazine | News | Comments

Man-in-the-middle (MITM) attacks are “wreaking havoc” on Android users because over two-thirds of the most popular apps on Google Play contain SSL vulnerabilities, according to new research from FireEye.             

Advertisement
While Android phones are constantly targeted by cyber criminals, the iPhone is considered more secure. Now, leaked documents from one of the world's leading surveillance companies have reaffirmed the idea.

Apple's iOS Blocks Gov't Spying Efforts, Gamma's FinSpy Useless against iPhone

August 13, 2014 9:52 am | by Charlie Osborne | Blogs | Comments

While Android phones are constantly targeted by cyber criminals, the iPhone is considered more secure. Now, leaked documents from one of the world's leading surveillance companies have reaffirmed the idea.             

Rogue cellular towers and phony base stations long have been a tradition of researchers at Black Hat and DEF CON, who test and demonstrate how they can intercept or manipulate cellphones, but a team of researchers has found a deeper problem of major secur

Way for Phones to be Contolled is Built In

July 31, 2014 3:23 pm | by Kelly Jackson Higgins, Dark Reading | News | Comments

Rogue cellular towers and phony base stations long have been a tradition of researchers at Black Hat and DEF CON, who test and demonstrate how they can intercept or manipulate cellphones, but a team of researchers has found a deeper problem of major security vulnerabilities in the client control software running on the majority of mobile phones around the world.

The early use of digital forensics proved invaluable in a company’s investigation and legal pursuit of a renegade employee, averting potentially large business losses. Such effective outcomes can be challenging due to constant advancment of technology.

Digital Forensics in the Mobile, BYOD, Cloud Era

July 23, 2014 10:59 am | by Kerry Francis and Matt Larson, Inside Counsel | News | Comments

The early use of digital forensics proved invaluable in a company’s investigation and legal pursuit of a renegade employee, averting potentially large business losses. Such effective outcomes can be challenging due to constant advancment of technology.

I put together a python script that parses out several plist files related to Safari Internet History. Since the iPhone also uses Safari, I decided to expand the script to parse some iPhone Safari artifacts.

Safari and iPhone Internet History Parser

July 23, 2014 9:32 am | by Mari DeGrazia | Blogs | Comments

I put together a python script that parses out several plist files related to Safari Internet History. Since the iPhone also uses Safari, I decided to expand the script to parse some iPhone Safari artifacts.            

Forensic Scientist Identifies 'Back Doors' Running on iOS

July 21, 2014 2:25 pm | by Jason O'Grady | Blogs | Comments

Forensic scientist and author Jonathan Zdziarski has posted the slides from his talk at the Hackers On Planet Earth (HOPE/X) conference in New York called Identifying Backdoors, Attack Points, and Surveillance Mechanisms in iOS Devices.  

Advertisement

Android Has Some Words with Monkey

July 18, 2014 8:03 am | by Editor | Blogs | Comments

The recent NIST Mobile Forensics Webcast and SANS FOR585 poster got monkey thinking about using the Android emulator for application artefact research. By using an emulator, we don't need to "root" an Android device in order to access artifacts from the protected data storage area.  

With the global smartphone market expected to total 1.75 billion users this year, it is rare for an investigator to conduct a digital forensic investigation that does not include a smartphone.

Digging for Data, Finding Evidence in Third-Party Applications

July 16, 2014 8:13 am | by Heather Mahalik and Cesar Quezada | Basis Technology, SANS Institute | Articles | Comments

With the global smartphone market expected to total 1.75 billion users this year, it is rare for an investigator to conduct a digital forensic investigation that does not include a smartphone. While smartphone forensics has vastly improved over the years, third-party apps are making it increasingly difficult for investigators to find data. As a result, valuable evidence is being overlooked.

Digital Crime-fighters Face Technical Challenges with Cloud Computing

July 15, 2014 3:55 pm | by NIST | News | Comments

The National Institute of Standards and Technology has issued for public review and comment a draft report summarizing 65 challenges that cloud computing poses to forensics investigators who uncover, gather, examine and interpret digital evidence to help solve crimes.

P2 Commander 3.6

July 11, 2014 4:06 pm | Paraben Corporation | Product Releases | Comments

Paraben's P2 Commander v3.6 adds the ability to perform forensic analysis of mobile device acquisitions from Device Seizure. This first step in integrating Paraben’s advanced computer forensics technology with its mobile forensics capabilities offers examiners more power in their mobile forensic acquisitions.

Identifying Android Device Owners

July 11, 2014 10:24 am | by John Lehr | Blogs | Comments

I've seen a trend in recovered stolen devices over the past few years: the bad guys are rapidly restoring devices to factory settings to prevent them from being tracked by the owner or law enforcement. That leaves me with a problem, though: how do I determine the owner of a device that has been restored?

Personal Data Recovered after Android's Factory Reset

July 8, 2014 11:04 am | by Seth Rosenblatt, CNet | News | Comments

A new study from security software vendor Avast calls into question the effectiveness of Android's factory reset option, which many people have relied upon to delete personal data from their old smartphones before reselling or making a charitable donation with the old device.

Device Seizure 6.6

July 8, 2014 8:51 am | Paraben Corporation | Product Releases | Comments

Device Seizure v6.66 has been released adding support for 100 percent of iOS devices and over 96 percent of Android devices. The release also adds physical support for Android 4.1.x, deleted message recovery of Symbian OS 7.x-9.x, smartphone app parsing and much more. 

Smartphones Can Still Be Searched by Border Cops

July 7, 2014 9:57 am | News | Comments

The Supreme Court released a landmark unanimous ruling last Wednesday limiting the ability of police officers to search a suspect's cellphone. But don't expect the Supreme Court's limitations to impact all law enforcement, because, as Aaron Sankin detailed on the Daily Dot, the United States Customs and Border Protection (CBP) still don't need to consult with a judge before browsing through your smartphone.

The Service You Can’t Refuse: A Secluded HijackRAT

July 2, 2014 1:05 pm | by Jinjian Zhai | Blogs | Comments

In Android world, sometimes you can’t stop malware from “serving” you, especially when the “service” is actually a malicious Android class running in the background and controlled by a remote access tool (RAT). Recently, FireEye mobile security researchers have discovered such a malware that pretends to be a “Google Service Framework” and kills an anti-virus application as well as takes other malicious actions.

Supreme Court Cites NIST Mobile Forensics Guide in Ruling on Cell Phone Searches

July 2, 2014 12:20 pm | by NIST | News | Comments

In considering the question of cell phone searches by police without a warrant, the Supreme Court ruling in Riley v California had to mesh established policy on search warrants together with an understanding of cell phone technology. To help with that challenge, the justices turned to a variety of sources, among them the NIST Guidelines on Mobile Device Forensics

The Frontier of Cloud Forensics

July 1, 2014 11:23 am | by William Jackson, GCN | News | Comments

Cloud computing helps to make data more accessible, but the same technologies that make it readily available — on-demand provisioning, reprovisioning and virtual environments — also can obscure it. This is creating new challenges for digital forensics, complicating incident response and criminal and civil investigations into incidents and data in the cloud.

Getting the most out of Smartphone Forensic Exams

June 30, 2014 4:47 am | by Editor | SANS Institute | Blogs | Comments

There is one certain thing in the DFIR field, and that is that there are far more facts, details and artifacts to remember than can easily be retained in any forensic examiner's brain. SANS has produced an incredibly helpful array of Posters and Cheat Sheets for DFIR in order to assist examiners with those tidbits of information than can help to jumpstart their forensics exams and or intrusion and incident response investigations.

X
You may login with either your assigned username or your e-mail address.
The password field is case sensitive.
Loading