Advertisement
Mobile Devices
Subscribe to Mobile Devices

The Lead

Security researchers have warned of a serious security flaw in Android which could potentially leave every device open to attack.

Binder Could Blow Apart Android Security

October 17, 2014 10:03 am | by Phil Muncaster, Infosecurity Magazine | News | Comments

Security researchers have warned of a serious security flaw in Android which could potentially leave every device open to attack.                                 

FBI Director Warns Cellphone Encryption Will Harm Investigation

October 17, 2014 9:12 am | by Eric Tucker and Jack Gillum, Associated Press | News | Comments

FBI Director James Comey has warned in stark terms against the push by technology...

Snapsaved.com Claims Hackers Stole Snapchat Images

October 14, 2014 10:25 am | by Reuters | News | Comments

Snapsaved.com, a website which allows users to save images sent via Snapchat, claims that...

Smartphones 'Remotely Wiped' in Police Custody

October 10, 2014 11:06 am | by Zack Whittaker | Blogs | Comments

British police forces have complained that as many as six smartphones seized have been remotely...

View Sample

SUBSCRIBE TO FREE DFI News EMAIL NEWSLETTER

Inside the Homeland Security Investigations Computer Forensics Lab

October 10, 2014 10:57 am | by Vince Lattanzio, NBC Philidelphia | News | Comments

Nearly every case Homeland Security Investigations (HSI) opens has some sort of digital evidence to be collected and analyzed. But the work can’t be done by just anyone. The data must be meticulously cared for by agents trained to preserve the integrity of the material, who can also combat suspects’ attempts to erase their digital dealings — even from afar.

When two 13-year-old Andover girls went missing last week, the first place detectives looked was for the digital clues in their iPods and smartphones. It worked. The girls were soon found in the basement of a 23-year-old man, who is now charged with felon

Minnesota Detectives Find Missing Girls with Digital Forensics

October 6, 2014 9:37 am | by Shannon Prather, Star Tribune | News | Comments

When two 13-year-old Andover girls went missing last week, the first place detectives looked was for the digital clues in their iPods and smartphones. It worked. The girls were soon found in the basement of a 23-year-old man, who is now charged with felony criminal sexual conduct, kidnapping and solicitation of a child.

Windows Phone 8.0 SMS, Call History and Contacts Scripts

Windows Phone 8.0 SMS, Call History and Contacts Scripts

October 6, 2014 9:06 am | by Editor | Blogs | Comments

Following on from our previous Windows Phone post and after some excellent testing feedback, it's time to release some Windows Phone 8.0 scripts for extracting SMS, Call History and Contacts.                 

Advertisement
Have your Snapchat friends taken to calling you fat recently? If so, don't get mad at them - their suggestion that you pop a weight loss pill is probably the result of having their account hacked.

Snapchat Says Fat Spam is Not Its Fault

October 1, 2014 10:10 am | by Lee Munson | Blogs | Comments

Have your Snapchat friends taken to calling you fat recently? If so, don't get mad at them — their suggestion that you pop a weight loss pill is probably the result of having their account hacked.             

US Attorney General Eric Holder has become the latest senior official to argue against stronger privacy enhancing encryption on smartphones, claiming it has emboldened online criminals and child abusers.

Attorney General Slams Strong Phone Encryption

October 1, 2014 10:03 am | by Phil Muncaster, Infosecurity Magazine | News | Comments

US Attorney General Eric Holder has become the latest senior official to argue against stronger privacy enhancing encryption on smartphones, claiming it has emboldened online criminals and child abusers.             

The United States Supreme Court’s ruling in Riley v. US may not have been much of a surprise to American law enforcement. Many agencies were already requiring officers to obtain search warrants before searching mobile devices. Ultimately, rather than limi

Mobile Device Search and Seizure in a Post-Riley World

October 1, 2014 8:26 am | by Christa Miller | Cellebrite USA, Inc. | Articles | Comments

The United States Supreme Court’s ruling in Riley v. US may not have been much of a surprise to American law enforcement. Many agencies were already requiring officers to obtain search warrants before searching mobile devices. Ultimately, rather than limiting law enforcement, the Riley decision frees agencies to deploy mobile data extraction capabilities across a much wider field of officers.

FBI Director James B. Comey sharply criticized Apple and Google recently for developing forms of smartphone encryption so secure that law enforcement officials cannot easily gain access to information stored on the devices — even when they have valid sear

FBI Blasts Apple, Google for Blocking Phones from Police Investigation

September 26, 2014 10:13 am | by Craig Timberg and Greg Miller, The Washington Post | News | Comments

FBI Director James B. Comey sharply criticized Apple and Google recently for developing forms of smartphone encryption so secure that law enforcement officials cannot easily gain access to information stored on the devices — even when they have valid search warrants.

Much like other mobile chat applications, WhatsApp contacts, messages, and attachments can be valuable to examiners looking to recover evidence for a variety of different investigation types. Whether you’re analyzing the mobile device of a suspect or a vi

Recovering WhatsApp Forensic Artifacts

September 24, 2014 8:20 am | by Jamie McQuaid | Blogs | Comments

Much like other mobile chat applications, WhatsApp contacts, messages, and attachments can be valuable to examiners looking to recover evidence for a variety of different investigation types. Whether you’re analyzing the mobile device of a suspect or a victim, these chat artifacts can contain valuable information to help solve a case.

Advertisement

Accurate Data, Forensic Soundness

September 23, 2014 8:27 am | by Ronen Engler and Christa M. Miller | Cellebrite USA, Inc. | Articles | Comments

Boot loaders are currently considered the most forensically sound physical extraction method. While they do involve loading a piece of code onto the device, this happens before the forensic tool accesses any evidentiary data. That’s because they replace the device’s normal boot loader, or the first set of operations that kick off the phone’s startup process and hand off to the main controlling program, like the operating system.

In many cases, the American judicial system doesn’t view an encrypted phone as an insurmountable privacy protection for those accused of a crime. Instead, it’s seen as an obstruction of the evidence-gathering process, and a stubborn defendant or witness c

Courts See an Encrypted Phone as Evidence Obstruction

September 22, 2014 10:27 am | by Andy Greenberg, Wired | News | Comments

In many cases, the American judicial system doesn’t view an encrypted phone as an insurmountable privacy protection for those accused of a crime. Instead, it’s seen as an obstruction of the evidence-gathering process, and a stubborn defendant or witness can be held in contempt of court and jailed for failing to unlock a phone to provide that evidence.

The next generation of Google’s Android operating system, due for release next month, will encrypt data by default for the first time, the company said Thursday, raising yet another barrier to police gaining access to the troves of personal data typically

New Androids to Offer Default Encryption, Blocking Police

September 19, 2014 10:59 am | by Craig Timberg, The Washington Post | News | Comments

The next generation of Google’s Android operating system, due for release next month, will encrypt data by default for the first time, the company said Thursday, raising yet another barrier to police gaining access to the troves of personal data typically kept on smartphones.

A reminder to iPhone owners cheering Apple’s latest privacy win: Just because Apple will no longer help police to turn your smartphone inside out doesn’t mean it can prevent police from vivisecting the device on their own.

You Can Still Pull Data Off a Locked iPhone

September 19, 2014 10:46 am | by Andy Greenberg, Wired | News | Comments

A reminder to iPhone owners cheering Apple’s latest privacy win: Just because Apple will no longer help police to turn your smartphone inside out doesn’t mean it can prevent police from vivisecting the device on their own.

Fifteen million mobile devices are infected with malware, and most of those run Android, according to a new report by Alcatel-Lucent's Kindsight Security Labs.

15 Million Devices Infected with Mobile Malware

September 10, 2014 10:45 am | by Sara Peters | Blogs | Comments

Fifteen million mobile devices are infected with malware, and most of those run Android, according to a new report by Alcatel-Lucent's Kindsight Security Labs.                         

Advertisement
Last week, Cindy Murphy (@cindymurph) sent me some Registry hive files ... from a Windows Phone 8. This was pretty fascinating, and fortunate, because I'd never seen a Windows phone, and had no idea if it had a Registry. Well, thanks to Cindy, I now know

Windows Phone 8 and RegRipper

September 10, 2014 10:34 am | by Harlan Carvey | Blogs | Comments

Last week, Cindy Murphy (@cindymurph) sent me some Registry hive files ... from a Windows Phone 8. This was pretty fascinating, and fortunate, because I'd never seen a Windows phone, and had no idea if it had a Registry. Well, thanks to Cindy, I now know that it does!

Cyber Forensics Group Reveals Smartphone App Vulnerabilities

September 9, 2014 12:47 pm | by Univ. of New Haven | News | Comments

Security flaws, breaches of privacy and additional vulnerabilities in chat, dating and other social media apps used by nearly one billion subscribers will be revealed by the University of New Haven's Cyber Forensics Research and Education Group (UNHcFREG).

Device and data security will assume critical significance for companies adopting a bring you own device (BYOD) policy, especially with nearly 50 percent of companies having reported lost mobile handsets in the last year. According to IT services speciali

BYOD Policy Helps Avoid Major Security Breaches

September 3, 2014 11:57 am | by ITC Infotech | News | Comments

Device and data security will assume critical significance for companies adopting a bring you own device (BYOD) policy, especially with nearly 50 percent of companies having reported lost mobile handsets in the last year. According to IT services specialist ITC Infotech, lack of a stringent BYOD policy can lead to the risk of a major security breach.

Mobile forensics has changed the methodology when it comes to offender profiling.  The frequent use of mobile devices has provided investigators with another source for profiling criminal suspects, as well as an insight into their habits and personalities

Mobile Forensics is Changing Offender Profiling

August 28, 2014 4:39 pm | by Yuval Ben-Moshe, Forensic Focus | News | Comments

Mobile forensics has changed the methodology when it comes to offender profiling.  The frequent use of mobile devices has provided investigators with another source for profiling criminal suspects, as well as an insight into their habits and personalities.

Governor Jerry Brown of California on Monday signed into law a measure that requires smartphones sold in California to include smarter antitheft technology, a feature that lawmakers hope will help reduce phone theft.

California Governor Signs Law Requiring 'Kill Switch' on Smartphones

August 26, 2014 10:19 am | by Brian Chen | Blogs | Comments

Governor Jerry Brown of California on Monday signed into law a measure that requires smartphones sold in California to include smarter antitheft technology, a feature that lawmakers hope will help reduce phone theft.         

A team of researchers have identified a weakness believed to exist in Android, Windows and iOS mobile operating systems that could be used to obtain personal information from unsuspecting users. They demonstrated the hack in an Android phone.

Mobile OS Weakness Allows Apps to Steal Personal Information

August 25, 2014 9:47 am | by Sean Nealon, Univ. of California - Riverside | News | Comments

A team of researchers have identified a weakness believed to exist in Android, Windows and iOS mobile operating systems that could be used to obtain personal information from unsuspecting users. They demonstrated the hack in an Android phone.  

One important basic concept to grasp is working with character classes, or sets. A character class performs a search and matches only one character out of a choice of several.

Data Search Character Classes

August 21, 2014 4:01 pm | Articles | Comments

One important basic concept to grasp is working with character classes, or sets. A character class performs a search and matches only one character out of a choice of several.                     

Computer security researchers TU Darmstadt/CASED in Germany and North Carolina State University in USA have developed a modification to the core Android operating system that allows developers and users to plug in new security enhancements. The new Androi

Researchers Develop Framework to Facilitate New Android Security Modules

August 21, 2014 10:41 am | by CASED | News | Comments

Computer security researchers from TU Darmstadt/CASED in Germany and North Carolina State University in USA have developed a modification to the core Android operating system that allows developers and users to plug in new security enhancements. The new Android Security Modules (ASM) framework aims to eliminate the bottleneck that prevents developers and users from taking advantage of new security tools.

Man-in-the-middle (MITM) attacks are “wreaking havoc” on Android users because over two-thirds of the most popular apps on Google Play contain SSL vulnerabilities, according to new research from FireEye.

SSL Vulnerabilities Found in Most Popular Android Apps

August 21, 2014 10:22 am | by Infosecurity Magazine | News | Comments

Man-in-the-middle (MITM) attacks are “wreaking havoc” on Android users because over two-thirds of the most popular apps on Google Play contain SSL vulnerabilities, according to new research from FireEye.             

While Android phones are constantly targeted by cyber criminals, the iPhone is considered more secure. Now, leaked documents from one of the world's leading surveillance companies have reaffirmed the idea.

Apple's iOS Blocks Gov't Spying Efforts, Gamma's FinSpy Useless against iPhone

August 13, 2014 9:52 am | by Charlie Osborne | Blogs | Comments

While Android phones are constantly targeted by cyber criminals, the iPhone is considered more secure. Now, leaked documents from one of the world's leading surveillance companies have reaffirmed the idea.             

Rogue cellular towers and phony base stations long have been a tradition of researchers at Black Hat and DEF CON, who test and demonstrate how they can intercept or manipulate cellphones, but a team of researchers has found a deeper problem of major secur

Way for Phones to be Contolled is Built In

July 31, 2014 3:23 pm | by Kelly Jackson Higgins, Dark Reading | News | Comments

Rogue cellular towers and phony base stations long have been a tradition of researchers at Black Hat and DEF CON, who test and demonstrate how they can intercept or manipulate cellphones, but a team of researchers has found a deeper problem of major security vulnerabilities in the client control software running on the majority of mobile phones around the world.

The early use of digital forensics proved invaluable in a company’s investigation and legal pursuit of a renegade employee, averting potentially large business losses. Such effective outcomes can be challenging due to constant advancment of technology.

Digital Forensics in the Mobile, BYOD, Cloud Era

July 23, 2014 10:59 am | by Kerry Francis and Matt Larson, Inside Counsel | News | Comments

The early use of digital forensics proved invaluable in a company’s investigation and legal pursuit of a renegade employee, averting potentially large business losses. Such effective outcomes can be challenging due to constant advancment of technology.

X
You may login with either your assigned username or your e-mail address.
The password field is case sensitive.
Loading