Advertisement
Mobile Devices
Subscribe to Mobile Devices

The Lead

Coolpad Android Devices Have Built in Backdoor

December 18, 2014 11:13 am | News | Comments

Security researchers have discovered a backdoor in Android devices sold by Coolpad, a Chinese smartphone manufacturer. The “CoolReaper” vuln has exposed over 10 million users to potential malicious activity. Palo Alto Networks reckons the malware was “installed and maintained by Coolpad despite objections from customers”.

Apps, Not Malware, Should be Your Biggest Mobile Concern

December 17, 2014 10:02 am | by Patrick Marshall | Blogs | Comments

Network security would be relatively simple if it weren't for end users. But just when IT...

UW Tacoma Partners with Tacoma PD to Teach Mobile Digital Forensics

December 17, 2014 9:19 am | by University of Washington Tacoma | News | Comments

The Institute of Technology at the University of Washington Tacoma, in...

Police Departments Join Forces, Bring Tech Analysis In-house

December 16, 2014 11:50 am | by Jessie Van Berkel, Star Tribune | News | Comments

Dakota county is creating the first local Electronic Crimes Task Force based in Minnesota. Ten...

View Sample

SUBSCRIBE TO FREE DFI News EMAIL NEWSLETTER

SiQuest was voted "Industry Innovator 2014" by SC Magazine under the category of Analysis and Testing for the evaluation and performance of their new Internet Examiner® Toolkit forensic software.

SiQuest Voted Industry Innovator 2014

December 15, 2014 11:27 am | SiQuest Corporation | News | Comments

SiQuest was voted "Industry Innovator 2014" by SC Magazine under the category of Analysis and Testing for the evaluation and performance of their new Internet Examiner® Toolkit forensic software.               

Not long ago, mobile device forensics was a relatively straightforward process. Contact lists, SMS messages, and call logs were obtained and examined for evidence using specialized forensic technology. But with the blistering rate of advances in mobile te

5 Key Challenges for Keeping Up with Advancements in Mobile

December 10, 2014 10:24 am | by Lee Reiber | Articles | Comments

Not long ago, mobile device forensics was a relatively straightforward process. Contact lists, SMS messages, and call logs were obtained and examined for evidence using specialized forensic technology. But with the blistering rate of advances in mobile technology, the explosion of mobile data and devices, times have drastically changed. 

A newly published guidebook provides correctional administrators with a brief, yet comprehensive and informative, view of cell phone forensic technologies.

Guide Details Cell Phone Forensic Technologies for Corrections

December 9, 2014 10:00 am | by NIJ | News | Comments

A newly published guidebook provides correctional administrators with a brief, yet comprehensive and informative, view of cell phone forensic technologies.                           

Advertisement
Phones from low-cost, third-tier vendors in Asia and Africa have been affected, but that doesn't mean it can't happen here.

DeathRing Malware Found Pre-installed on Smartphones

December 5, 2014 10:11 am | by Jai Vijayan | Blogs | Comments

Phones from low-cost, third-tier vendors in Asia and Africa have been affected, but that doesn't mean it can't happen here.                                    

The theft of trade secrets in U.S. businesses is increasing rapidly and is expected to double within the next decade, according to a recent report. These incidents and other suspicious behavior are the catalyst for lengthy, expensive forensic investigatio

Digital Forensics Can Use Facebook to Solve Cases

December 4, 2014 9:44 am | by Brett Harrison and Chad McDonnell, Baseline | News | Comments

The theft of trade secrets in U.S. businesses is increasing rapidly and is expected to double within the next decade, according to a recent report. These incidents and other suspicious behavior are the catalyst for lengthy, expensive forensic investigations. Digital forensic investigators will seek evidence from a wide array of devices and data sources, including mobile devices.

Newly discovered court documents from two federal criminal cases in New York and California that remain otherwise sealed suggest that the Department of Justice (DOJ) is pursuing an unusual legal strategy to compel cellphone makers to assist investigations

Gov Seeks Apple's Help with Encrypted Phones

December 1, 2014 11:26 am | by Cyrus Farivar, Ars Technica | News | Comments

Newly discovered court documents from two federal criminal cases in New York and California that remain otherwise sealed suggest that the Department of Justice (DOJ) is pursuing an unusual legal strategy to compel cellphone makers to assist investigations.

A Danish citizen has had the dubious honor of becoming the first ever person to be convicted of selling spyware in the US.

Danish Man Pleads Guilty to Selling Spyware App

December 1, 2014 10:37 am | by Phil Muncaster, Infosecurity Magazine | News | Comments

A Danish citizen has had the dubious honor of becoming the first ever person to be convicted of selling spyware in the US.                                     

With the release of Internet Evidence Finder v6.5, Magnet Forensics adds support for Windows Phone, and introduces new triage features including live system artifact recovery capabilities.

Internet Evidence Finder v6.5

November 26, 2014 8:40 am | Magnet Forensics, Inc. (formerly JADsoftware) | Product Releases | Comments

With the release of Internet Evidence Finder v6.5, Magnet Forensics adds support for Windows Phone, and introduces new triage features including live system artifact recovery capabilities.

Advertisement

Cell Phone Tracking via Call Detail Records

November 25, 2014 7:07 am | by Larry E. Daniel | Blogs | Comments

We live in a world today where individuals’ movements and locations are being recorded in many different ways. These movements and locations are commonly being used as evidence in civil, criminal, and domestic litigation. It is of paramount importance that anyone who is involved in litigation that uses cellular location evidence understands the appropriate and inappropriate use of this type of location data.

The Importance of Forensic Analysis Training

November 25, 2014 7:00 am | by Heather Mahalik | SANS Institute | Articles | Comments

The mobile device industry is evolving very quickly. To stay current on the latest devices and the proper techniques for acquiring and analyzing data, smartphone and mobile device forensic analysis training courses are becoming more and more necessary. 

It’s by no means complete yet, but the transition to a mobile IT environment in government is well established. Parallel with that, however, is the expectation that mobile communications will be able to deliver all that society expects in the way of seaml

5G Will Power Network of the Future

November 20, 2014 12:28 pm | by Brian Robinson, GCN | News | Comments

It’s by no means complete yet, but the transition to a mobile IT environment in government is well established. Parallel with that, however, is the expectation that mobile communications will be able to deliver all that society expects in the way of seamless audio, video streaming and fast transfer of multi-megabyte data files.  

Mobile security firm Lookout has discovered a more sophisticated variant of the NotCompatible Android botnet which it says targets enterprise networks through compromised mobile devices.

Botnet Infects Android, Infiltrates Corporate Networks

November 20, 2014 12:17 pm | by Doug Drinkwater, SC Magazine | News | Comments

Mobile security firm Lookout has discovered a more sophisticated variant of the NotCompatible Android botnet which it says targets enterprise networks through compromised mobile devices.                  

We live in a world today where individuals’ movements and locations are being recorded in many different ways. These movements and locations are commonly being used as evidence in civil, criminal and domestic litigation. It is of paramount importance that

Cell Phone Tracking via Call Detail Records

November 19, 2014 10:34 am | by Larry E. Daniel | Blogs | Comments

We live in a world today where individuals’ movements and locations are being recorded in many different ways. These movements and locations are commonly being used as evidence in civil, criminal and domestic litigation. It is of paramount importance that anyone who is involved in litigation that uses cellular location evidence understands the appropriate and inappropriate use of this type of location data.

Advertisement
The immensely popular Whatsapp instant messenger has the potential to become an even more attractive option for users, as the company has partnered with Open Whisper Systems to implement the latter's TextSecure protocol into their clients.

Open Whisper Systems Helps WhatsApp Achieve End-to-end Encryption

November 18, 2014 12:22 pm | by Zeljka Zorz, Help Net Security | News | Comments

The immensely popular Whatsapp instant messenger has the potential to become an even more attractive option for users, as the company has partnered with Open Whisper Systems to implement the latter's TextSecure protocol into their clients.   

As digital devices continue to proliferate, digital storage capacities are approximately doubling every two years. The sheer amount of digital media being submitted for forensic analysis is overwhelming.

Growth of Digital Forensic Workflow

November 14, 2014 12:05 pm | Articles | Comments

As digital devices continue to proliferate, digital storage capacities are approximately doubling every two years. The sheer amount of digital media being submitted for forensic analysis is overwhelming.             

The National Institute of Standards and Technology is readying guidance to help agencies evaluate commercial mobile applications that agency workers might use on government-issued devices or personal apps that access government networks.

NIST Drafts Guide for Checking Apps Used at Work

November 14, 2014 10:29 am | by Stephanie Kanowitz, GCN | News | Comments

The National Institute of Standards and Technology is readying guidance to help agencies evaluate commercial mobile applications that agency workers might use on government-issued devices or personal apps that access government networks.   

The Justice Department is collecting data from thousands of cellphones through high-tech gear deployed on airplanes that mimics communications towers, The Wall Street Journal has reported.

Planes Gather Cellphone Data to Find Criminals

November 14, 2014 10:11 am | by Associated Press | News | Comments

The Justice Department is collecting data from thousands of cellphones through high-tech gear deployed on airplanes that mimics communications towers, The Wall Street Journal has reported.               

For most of the iPhone's lifespan, it's been effectively immune to malware. There were theoretical attacks and viruses targeting jailbroken phones, but thanks to the tight controls of the App Store, finding iOS malware in the wild has been nearly impossib

The iPhone Just Lost Its Perfect Security Record

November 6, 2014 11:56 am | by Russell Brandom, The Verge | News | Comments

For most of the iPhone's lifespan, it's been effectively immune to malware. There were theoretical attacks and viruses targeting jailbroken phones, but thanks to the tight controls of the App Store, finding iOS malware in the wild has been nearly impossible. Yesterday, that changed. 

The MobileSec RF Guardian cell phone blocker can block cell signal reception near a cell tower. It is perfect for both law enforcement and military digital forensics isolation of devices.

Cell Phone Blocker

November 6, 2014 8:58 am | Product Releases | Comments

The MobileSec RF Guardian cell phone blocker can block cell signal reception near a cell tower. It is perfect for both law enforcement and military digital forensics isolation of devices.

Wired and Forbes reported recently that the two largest cellphone carriers in the United States, Verizon and AT&T, are adding the tracking number to their subscribers' Internet activity, even when users opt out.

Somebody's Already Using Verizon's ID to Track Users

November 4, 2014 10:43 am | by Julia Angwin and Jeff Larson, ProPublica | News | Comments

Wired and Forbes reported recently that the two largest cellphone carriers in the United States, Verizon and AT&T, are adding the tracking number to their subscribers' Internet activity, even when users opt out.     

A Virginia circuit court judge has ruled that smartphone users can be compelled to give up their fingerprint, but not their passcodes, allowing police to search their devices.

Va Police Can Now Force Smartphones to be Unlocked with a Fingerprint

November 3, 2014 8:53 am | by Zack Whittaker | Blogs | Comments

A Virginia circuit court judge has ruled that smartphone users can be compelled to give up their fingerprint, but not their passcodes, allowing police to search their devices.                     

Boot loaders are currently considered the most forensically sound physical extraction method. While they do involve loading a piece of code onto the device, this happens before the forensic tool accesses any evidentiary data. That’s because they replace t

Accurate Data, Forensic Soundness

October 31, 2014 8:23 am | by Ronen Engler and Christa M. Miller | Cellebrite USA, Inc. | Articles | Comments

Boot loaders are currently considered the most forensically sound physical extraction method. While they do involve loading a piece of code onto the device, this happens before the forensic tool accesses any evidentiary data. That’s because they replace the device’s normal boot loader, or the first set of operations that kick off the phone’s startup process and hand off to the main controlling program, like the operating system.

American Airlines Flight 136 from LAX to London was delayed recently after someone in the vicinity picked an inappropriate name for their Wi-Fi hotspot.

'Al-Quida Free Terror Nettwork' Wi-Fi Hotspot Grounds Plane

October 29, 2014 9:56 am | by Lee Munson | Blogs | Comments

American Airlines Flight 136 from LAX to London was delayed recently after someone in the vicinity picked an inappropriate name for their Wi-Fi hotspot.                            

Samsung's Knox security software for Android devices handles passwords in a way that undermines encryption, an anonymous researcher says.

Researcher Says Knox is Weak

October 27, 2014 12:34 pm | by Thomas Claburn, Information Week | News | Comments

Samsung's Knox security software for Android devices handles passwords in a way that undermines encryption, an anonymous researcher says.                                

While revelations from Edward Snowden about the National Security Agency’s massive database of phone records have sparked a national debate about its constitutionality, another secretive database has gone largely unnoticed and without scrutiny.

Va Police Agencies Stockpile Private Phone Records

October 27, 2014 11:20 am | by G.W. Schulz, The Center for Investigative Reporting | News | Comments

While revelations from Edward Snowden about the National Security Agency’s massive database of phone records have sparked a national debate about its constitutionality, another secretive database has gone largely unnoticed and without scrutiny.

X
You may login with either your assigned username or your e-mail address.
The password field is case sensitive.
Loading