With the release of Internet Evidence Finder v6.5, Magnet Forensics adds support for Windows Phone, and introduces new triage features including live system artifact recovery capabilities.
We live in a world today where individuals’ movements and locations are being recorded in...
The mobile device industry is evolving very quickly. To stay current on the latest devices...
Mobile security firm Lookout has discovered a more sophisticated variant of the NotCompatible Android botnet which it says targets enterprise networks through compromised mobile devices.
We live in a world today where individuals’ movements and locations are being recorded in many different ways. These movements and locations are commonly being used as evidence in civil, criminal and domestic litigation. It is of paramount importance that anyone who is involved in litigation that uses cellular location evidence understands the appropriate and inappropriate use of this type of location data.
The immensely popular Whatsapp instant messenger has the potential to become an even more attractive option for users, as the company has partnered with Open Whisper Systems to implement the latter's TextSecure protocol into their clients.
As digital devices continue to proliferate, digital storage capacities are approximately doubling every two years. The sheer amount of digital media being submitted for forensic analysis is overwhelming.
The National Institute of Standards and Technology is readying guidance to help agencies evaluate commercial mobile applications that agency workers might use on government-issued devices or personal apps that access government networks.
The Justice Department is collecting data from thousands of cellphones through high-tech gear deployed on airplanes that mimics communications towers, The Wall Street Journal has reported.
For most of the iPhone's lifespan, it's been effectively immune to malware. There were theoretical attacks and viruses targeting jailbroken phones, but thanks to the tight controls of the App Store, finding iOS malware in the wild has been nearly impossible. Yesterday, that changed.
The MobileSec RF Guardian cell phone blocker can block cell signal reception near a cell tower. It is perfect for both law enforcement and military digital forensics isolation of devices.
Wired and Forbes reported recently that the two largest cellphone carriers in the United States, Verizon and AT&T, are adding the tracking number to their subscribers' Internet activity, even when users opt out.
A Virginia circuit court judge has ruled that smartphone users can be compelled to give up their fingerprint, but not their passcodes, allowing police to search their devices.
Boot loaders are currently considered the most forensically sound physical extraction method. While they do involve loading a piece of code onto the device, this happens before the forensic tool accesses any evidentiary data. That’s because they replace the device’s normal boot loader, or the first set of operations that kick off the phone’s startup process and hand off to the main controlling program, like the operating system.
American Airlines Flight 136 from LAX to London was delayed recently after someone in the vicinity picked an inappropriate name for their Wi-Fi hotspot.
Samsung's Knox security software for Android devices handles passwords in a way that undermines encryption, an anonymous researcher says.
While revelations from Edward Snowden about the National Security Agency’s massive database of phone records have sparked a national debate about its constitutionality, another secretive database has gone largely unnoticed and without scrutiny.
Security researchers have warned of a serious security flaw in Android which could potentially leave every device open to attack.
FBI Director James Comey has warned in stark terms against the push by technology companies to encrypt smartphone data and operating systems, arguing that murder cases could be stalled, suspects could walk free and justice could be thwarted by a locked phone or an encrypted hard drive.
Snapsaved.com, a website which allows users to save images sent via Snapchat, claims that hackers had breached its servers and made off with some 500 megabytes of photographs.
British police forces have complained that as many as six smartphones seized have been remotely wiped in the past year, potentially killing vital evidence as part of ongoing investigations.
Nearly every case Homeland Security Investigations (HSI) opens has some sort of digital evidence to be collected and analyzed. But the work can’t be done by just anyone. The data must be meticulously cared for by agents trained to preserve the integrity of the material, who can also combat suspects’ attempts to erase their digital dealings — even from afar.
When two 13-year-old Andover girls went missing last week, the first place detectives looked was for the digital clues in their iPods and smartphones. It worked. The girls were soon found in the basement of a 23-year-old man, who is now charged with felony criminal sexual conduct, kidnapping and solicitation of a child.
Following on from our previous Windows Phone post and after some excellent testing feedback, it's time to release some Windows Phone 8.0 scripts for extracting SMS, Call History and Contacts.
Have your Snapchat friends taken to calling you fat recently? If so, don't get mad at them — their suggestion that you pop a weight loss pill is probably the result of having their account hacked.
US Attorney General Eric Holder has become the latest senior official to argue against stronger privacy enhancing encryption on smartphones, claiming it has emboldened online criminals and child abusers.
The United States Supreme Court’s ruling in Riley v. US may not have been much of a surprise to American law enforcement. Many agencies were already requiring officers to obtain search warrants before searching mobile devices. Ultimately, rather than limiting law enforcement, the Riley decision frees agencies to deploy mobile data extraction capabilities across a much wider field of officers.
FBI Director James B. Comey sharply criticized Apple and Google recently for developing forms of smartphone encryption so secure that law enforcement officials cannot easily gain access to information stored on the devices — even when they have valid search warrants.
- Page 1