Advertisement
Mobile Devices
Subscribe to Mobile Devices

The Lead

It’s by no means complete yet, but the transition to a mobile IT environment in government is well established. Parallel with that, however, is the expectation that mobile communications will be able to deliver all that society expects in the way of seaml

5G Will Power Network of the Future

November 20, 2014 12:28 pm | by Brian Robinson, GCN | News | Comments

It’s by no means complete yet, but the transition to a mobile IT environment in government is well established. Parallel with that, however, is the expectation that mobile communications will be able to deliver all that society expects in the way of seamless audio, video streaming and fast transfer of multi-megabyte data files.
 

Botnet Infects Android, Infiltrates Corporate Networks

November 20, 2014 12:17 pm | by Doug Drinkwater, SC Magazine | News | Comments

Mobile security firm Lookout has discovered a more sophisticated variant of the...

Cell Phone Tracking via Call Detail Records

November 19, 2014 10:34 am | by Larry E. Daniel | Blogs | Comments

We live in a world today where individuals’ movements and locations are being recorded in many...

Open Whisper Systems Helps WhatsApp Achieve End-to-end Encryption

November 18, 2014 12:22 pm | by Zeljka Zorz, Help Net Security | News | Comments

The immensely popular Whatsapp instant messenger has the potential to become an even more...

View Sample

SUBSCRIBE TO FREE DFI News EMAIL NEWSLETTER

As digital devices continue to proliferate, digital storage capacities are approximately doubling every two years. The sheer amount of digital media being submitted for forensic analysis is overwhelming.

Growth of Digital Forensic Workflow

November 14, 2014 12:05 pm | Articles | Comments

As digital devices continue to proliferate, digital storage capacities are approximately doubling every two years. The sheer amount of digital media being submitted for forensic analysis is overwhelming.             

The National Institute of Standards and Technology is readying guidance to help agencies evaluate commercial mobile applications that agency workers might use on government-issued devices or personal apps that access government networks.

NIST Drafts Guide for Checking Apps Used at Work

November 14, 2014 10:29 am | by Stephanie Kanowitz, GCN | News | Comments

The National Institute of Standards and Technology is readying guidance to help agencies evaluate commercial mobile applications that agency workers might use on government-issued devices or personal apps that access government networks.   

The Justice Department is collecting data from thousands of cellphones through high-tech gear deployed on airplanes that mimics communications towers, The Wall Street Journal has reported.

Planes Gather Cellphone Data to Find Criminals

November 14, 2014 10:11 am | by Associated Press | News | Comments

The Justice Department is collecting data from thousands of cellphones through high-tech gear deployed on airplanes that mimics communications towers, The Wall Street Journal has reported.               

Advertisement
For most of the iPhone's lifespan, it's been effectively immune to malware. There were theoretical attacks and viruses targeting jailbroken phones, but thanks to the tight controls of the App Store, finding iOS malware in the wild has been nearly impossib

The iPhone Just Lost Its Perfect Security Record

November 6, 2014 11:56 am | by Russell Brandom, The Verge | News | Comments

For most of the iPhone's lifespan, it's been effectively immune to malware. There were theoretical attacks and viruses targeting jailbroken phones, but thanks to the tight controls of the App Store, finding iOS malware in the wild has been nearly impossible. Yesterday, that changed. 

The MobileSec RF Guardian cell phone blocker can block cell signal reception near a cell tower. It is perfect for both law enforcement and military digital forensics isolation of devices.

Cell Phone Blocker

November 6, 2014 8:58 am | Product Releases | Comments

The MobileSec RF Guardian cell phone blocker can block cell signal reception near a cell tower. It is perfect for both law enforcement and military digital forensics isolation of devices.

Wired and Forbes reported recently that the two largest cellphone carriers in the United States, Verizon and AT&T, are adding the tracking number to their subscribers' Internet activity, even when users opt out.

Somebody's Already Using Verizon's ID to Track Users

November 4, 2014 10:43 am | by Julia Angwin and Jeff Larson, ProPublica | News | Comments

Wired and Forbes reported recently that the two largest cellphone carriers in the United States, Verizon and AT&T, are adding the tracking number to their subscribers' Internet activity, even when users opt out.     

A Virginia circuit court judge has ruled that smartphone users can be compelled to give up their fingerprint, but not their passcodes, allowing police to search their devices.

Va Police Can Now Force Smartphones to be Unlocked with a Fingerprint

November 3, 2014 8:53 am | by Zack Whittaker | Blogs | Comments

A Virginia circuit court judge has ruled that smartphone users can be compelled to give up their fingerprint, but not their passcodes, allowing police to search their devices.                     

Boot loaders are currently considered the most forensically sound physical extraction method. While they do involve loading a piece of code onto the device, this happens before the forensic tool accesses any evidentiary data. That’s because they replace t

Accurate Data, Forensic Soundness

October 31, 2014 8:23 am | by Ronen Engler and Christa M. Miller | Cellebrite USA, Inc. | Articles | Comments

Boot loaders are currently considered the most forensically sound physical extraction method. While they do involve loading a piece of code onto the device, this happens before the forensic tool accesses any evidentiary data. That’s because they replace the device’s normal boot loader, or the first set of operations that kick off the phone’s startup process and hand off to the main controlling program, like the operating system.

Advertisement
American Airlines Flight 136 from LAX to London was delayed recently after someone in the vicinity picked an inappropriate name for their Wi-Fi hotspot.

'Al-Quida Free Terror Nettwork' Wi-Fi Hotspot Grounds Plane

October 29, 2014 9:56 am | by Lee Munson | Blogs | Comments

American Airlines Flight 136 from LAX to London was delayed recently after someone in the vicinity picked an inappropriate name for their Wi-Fi hotspot.                            

Samsung's Knox security software for Android devices handles passwords in a way that undermines encryption, an anonymous researcher says.

Researcher Says Knox is Weak

October 27, 2014 12:34 pm | by Thomas Claburn, Information Week | News | Comments

Samsung's Knox security software for Android devices handles passwords in a way that undermines encryption, an anonymous researcher says.                                

While revelations from Edward Snowden about the National Security Agency’s massive database of phone records have sparked a national debate about its constitutionality, another secretive database has gone largely unnoticed and without scrutiny.

Va Police Agencies Stockpile Private Phone Records

October 27, 2014 11:20 am | by G.W. Schulz, The Center for Investigative Reporting | News | Comments

While revelations from Edward Snowden about the National Security Agency’s massive database of phone records have sparked a national debate about its constitutionality, another secretive database has gone largely unnoticed and without scrutiny.

Security researchers have warned of a serious security flaw in Android which could potentially leave every device open to attack.

Binder Could Blow Apart Android Security

October 17, 2014 10:03 am | by Phil Muncaster, Infosecurity Magazine | News | Comments

Security researchers have warned of a serious security flaw in Android which could potentially leave every device open to attack.                                 

FBI Director Warns Cellphone Encryption Will Harm Investigation

October 17, 2014 9:12 am | by Eric Tucker and Jack Gillum, Associated Press | News | Comments

FBI Director James Comey has warned in stark terms against the push by technology companies to encrypt smartphone data and operating systems, arguing that murder cases could be stalled, suspects could walk free and justice could be thwarted by a locked phone or an encrypted hard drive.

Advertisement

Snapsaved.com Claims Hackers Stole Snapchat Images

October 14, 2014 10:25 am | by Reuters | News | Comments

Snapsaved.com, a website which allows users to save images sent via Snapchat, claims that hackers had breached its servers and made off with some 500 megabytes of photographs.                     

British police forces have complained that as many as six smartphones seized have been remotely wiped in the past year, potentially killing vital evidence as part of ongoing investigations.

Smartphones 'Remotely Wiped' in Police Custody

October 10, 2014 11:06 am | by Zack Whittaker | Blogs | Comments

British police forces have complained that as many as six smartphones seized have been remotely wiped in the past year, potentially killing vital evidence as part of ongoing investigations.                 

Inside the Homeland Security Investigations Computer Forensics Lab

October 10, 2014 10:57 am | by Vince Lattanzio, NBC Philidelphia | News | Comments

Nearly every case Homeland Security Investigations (HSI) opens has some sort of digital evidence to be collected and analyzed. But the work can’t be done by just anyone. The data must be meticulously cared for by agents trained to preserve the integrity of the material, who can also combat suspects’ attempts to erase their digital dealings — even from afar.

When two 13-year-old Andover girls went missing last week, the first place detectives looked was for the digital clues in their iPods and smartphones. It worked. The girls were soon found in the basement of a 23-year-old man, who is now charged with felon

Minnesota Detectives Find Missing Girls with Digital Forensics

October 6, 2014 9:37 am | by Shannon Prather, Star Tribune | News | Comments

When two 13-year-old Andover girls went missing last week, the first place detectives looked was for the digital clues in their iPods and smartphones. It worked. The girls were soon found in the basement of a 23-year-old man, who is now charged with felony criminal sexual conduct, kidnapping and solicitation of a child.

Windows Phone 8.0 SMS, Call History and Contacts Scripts

Windows Phone 8.0 SMS, Call History and Contacts Scripts

October 6, 2014 9:06 am | by Editor | Blogs | Comments

Following on from our previous Windows Phone post and after some excellent testing feedback, it's time to release some Windows Phone 8.0 scripts for extracting SMS, Call History and Contacts.                 

Have your Snapchat friends taken to calling you fat recently? If so, don't get mad at them - their suggestion that you pop a weight loss pill is probably the result of having their account hacked.

Snapchat Says Fat Spam is Not Its Fault

October 1, 2014 10:10 am | by Lee Munson | Blogs | Comments

Have your Snapchat friends taken to calling you fat recently? If so, don't get mad at them — their suggestion that you pop a weight loss pill is probably the result of having their account hacked.             

US Attorney General Eric Holder has become the latest senior official to argue against stronger privacy enhancing encryption on smartphones, claiming it has emboldened online criminals and child abusers.

Attorney General Slams Strong Phone Encryption

October 1, 2014 10:03 am | by Phil Muncaster, Infosecurity Magazine | News | Comments

US Attorney General Eric Holder has become the latest senior official to argue against stronger privacy enhancing encryption on smartphones, claiming it has emboldened online criminals and child abusers.             

The United States Supreme Court’s ruling in Riley v. US may not have been much of a surprise to American law enforcement. Many agencies were already requiring officers to obtain search warrants before searching mobile devices. Ultimately, rather than limi

Mobile Device Search and Seizure in a Post-Riley World

October 1, 2014 8:26 am | by Christa Miller | Cellebrite USA, Inc. | Articles | Comments

The United States Supreme Court’s ruling in Riley v. US may not have been much of a surprise to American law enforcement. Many agencies were already requiring officers to obtain search warrants before searching mobile devices. Ultimately, rather than limiting law enforcement, the Riley decision frees agencies to deploy mobile data extraction capabilities across a much wider field of officers.

FBI Director James B. Comey sharply criticized Apple and Google recently for developing forms of smartphone encryption so secure that law enforcement officials cannot easily gain access to information stored on the devices — even when they have valid sear

FBI Blasts Apple, Google for Blocking Phones from Police Investigation

September 26, 2014 10:13 am | by Craig Timberg and Greg Miller, The Washington Post | News | Comments

FBI Director James B. Comey sharply criticized Apple and Google recently for developing forms of smartphone encryption so secure that law enforcement officials cannot easily gain access to information stored on the devices — even when they have valid search warrants.

Much like other mobile chat applications, WhatsApp contacts, messages, and attachments can be valuable to examiners looking to recover evidence for a variety of different investigation types. Whether you’re analyzing the mobile device of a suspect or a vi

Recovering WhatsApp Forensic Artifacts

September 24, 2014 8:20 am | by Jamie McQuaid | Blogs | Comments

Much like other mobile chat applications, WhatsApp contacts, messages, and attachments can be valuable to examiners looking to recover evidence for a variety of different investigation types. Whether you’re analyzing the mobile device of a suspect or a victim, these chat artifacts can contain valuable information to help solve a case.

In many cases, the American judicial system doesn’t view an encrypted phone as an insurmountable privacy protection for those accused of a crime. Instead, it’s seen as an obstruction of the evidence-gathering process, and a stubborn defendant or witness c

Courts See an Encrypted Phone as Evidence Obstruction

September 22, 2014 10:27 am | by Andy Greenberg, Wired | News | Comments

In many cases, the American judicial system doesn’t view an encrypted phone as an insurmountable privacy protection for those accused of a crime. Instead, it’s seen as an obstruction of the evidence-gathering process, and a stubborn defendant or witness can be held in contempt of court and jailed for failing to unlock a phone to provide that evidence.

The next generation of Google’s Android operating system, due for release next month, will encrypt data by default for the first time, the company said Thursday, raising yet another barrier to police gaining access to the troves of personal data typically

New Androids to Offer Default Encryption, Blocking Police

September 19, 2014 10:59 am | by Craig Timberg, The Washington Post | News | Comments

The next generation of Google’s Android operating system, due for release next month, will encrypt data by default for the first time, the company said Thursday, raising yet another barrier to police gaining access to the troves of personal data typically kept on smartphones.

X
You may login with either your assigned username or your e-mail address.
The password field is case sensitive.
Loading