The United States Supreme Court’s ruling in Riley v. US may not have been much of a surprise to American law enforcement. Many agencies were already requiring officers to obtain search warrants before searching mobile devices. Ultimately, rather than limiting law enforcement, the Riley decision frees agencies to deploy mobile data extraction capabilities across a much wider field of officers.
In many cases, the American judicial system doesn’t view an encrypted phone as an...
The next generation of Google’s Android operating system, due for release next month, will...
Fifteen million mobile devices are infected with malware, and most of those run Android, according to a new report by Alcatel-Lucent's Kindsight Security Labs.
Last week, Cindy Murphy (@cindymurph) sent me some Registry hive files ... from a Windows Phone 8. This was pretty fascinating, and fortunate, because I'd never seen a Windows phone, and had no idea if it had a Registry. Well, thanks to Cindy, I now know that it does!
Security flaws, breaches of privacy and additional vulnerabilities in chat, dating and other social media apps used by nearly one billion subscribers will be revealed by the University of New Haven's Cyber Forensics Research and Education Group (UNHcFREG).
Device and data security will assume critical significance for companies adopting a bring you own device (BYOD) policy, especially with nearly 50 percent of companies having reported lost mobile handsets in the last year. According to IT services specialist ITC Infotech, lack of a stringent BYOD policy can lead to the risk of a major security breach.
Mobile forensics has changed the methodology when it comes to offender profiling. The frequent use of mobile devices has provided investigators with another source for profiling criminal suspects, as well as an insight into their habits and personalities.
Governor Jerry Brown of California on Monday signed into law a measure that requires smartphones sold in California to include smarter antitheft technology, a feature that lawmakers hope will help reduce phone theft.
A team of researchers have identified a weakness believed to exist in Android, Windows and iOS mobile operating systems that could be used to obtain personal information from unsuspecting users. They demonstrated the hack in an Android phone.
One important basic concept to grasp is working with character classes, or sets. A character class performs a search and matches only one character out of a choice of several.
Computer security researchers from TU Darmstadt/CASED in Germany and North Carolina State University in USA have developed a modification to the core Android operating system that allows developers and users to plug in new security enhancements. The new Android Security Modules (ASM) framework aims to eliminate the bottleneck that prevents developers and users from taking advantage of new security tools.
Man-in-the-middle (MITM) attacks are “wreaking havoc” on Android users because over two-thirds of the most popular apps on Google Play contain SSL vulnerabilities, according to new research from FireEye.
While Android phones are constantly targeted by cyber criminals, the iPhone is considered more secure. Now, leaked documents from one of the world's leading surveillance companies have reaffirmed the idea.
Rogue cellular towers and phony base stations long have been a tradition of researchers at Black Hat and DEF CON, who test and demonstrate how they can intercept or manipulate cellphones, but a team of researchers has found a deeper problem of major security vulnerabilities in the client control software running on the majority of mobile phones around the world.
The early use of digital forensics proved invaluable in a company’s investigation and legal pursuit of a renegade employee, averting potentially large business losses. Such effective outcomes can be challenging due to constant advancment of technology.
I put together a python script that parses out several plist files related to Safari Internet History. Since the iPhone also uses Safari, I decided to expand the script to parse some iPhone Safari artifacts.
Forensic scientist and author Jonathan Zdziarski has posted the slides from his talk at the Hackers On Planet Earth (HOPE/X) conference in New York called Identifying Backdoors, Attack Points, and Surveillance Mechanisms in iOS Devices.
The recent NIST Mobile Forensics Webcast and SANS FOR585 poster got monkey thinking about using the Android emulator for application artefact research. By using an emulator, we don't need to "root" an Android device in order to access artifacts from the protected data storage area.
With the global smartphone market expected to total 1.75 billion users this year, it is rare for an investigator to conduct a digital forensic investigation that does not include a smartphone. While smartphone forensics has vastly improved over the years, third-party apps are making it increasingly difficult for investigators to find data. As a result, valuable evidence is being overlooked.
The National Institute of Standards and Technology has issued for public review and comment a draft report summarizing 65 challenges that cloud computing poses to forensics investigators who uncover, gather, examine and interpret digital evidence to help solve crimes.
Paraben's P2 Commander v3.6 adds the ability to perform forensic analysis of mobile device acquisitions from Device Seizure. This first step in integrating Paraben’s advanced computer forensics technology with its mobile forensics capabilities offers examiners more power in their mobile forensic acquisitions.
I've seen a trend in recovered stolen devices over the past few years: the bad guys are rapidly restoring devices to factory settings to prevent them from being tracked by the owner or law enforcement. That leaves me with a problem, though: how do I determine the owner of a device that has been restored?
A new study from security software vendor Avast calls into question the effectiveness of Android's factory reset option, which many people have relied upon to delete personal data from their old smartphones before reselling or making a charitable donation with the old device.
Device Seizure v6.66 has been released adding support for 100 percent of iOS devices and over 96 percent of Android devices. The release also adds physical support for Android 4.1.x, deleted message recovery of Symbian OS 7.x-9.x, smartphone app parsing and much more.
The Supreme Court released a landmark unanimous ruling last Wednesday limiting the ability of police officers to search a suspect's cellphone. But don't expect the Supreme Court's limitations to impact all law enforcement, because, as Aaron Sankin detailed on the Daily Dot, the United States Customs and Border Protection (CBP) still don't need to consult with a judge before browsing through your smartphone.
In Android world, sometimes you can’t stop malware from “serving” you, especially when the “service” is actually a malicious Android class running in the background and controlled by a remote access tool (RAT). Recently, FireEye mobile security researchers have discovered such a malware that pretends to be a “Google Service Framework” and kills an anti-virus application as well as takes other malicious actions.
In considering the question of cell phone searches by police without a warrant, the Supreme Court ruling in Riley v California had to mesh established policy on search warrants together with an understanding of cell phone technology. To help with that challenge, the justices turned to a variety of sources, among them the NIST Guidelines on Mobile Device Forensics.
- Page 1