Security researchers have discovered a backdoor in Android devices sold by Coolpad, a Chinese smartphone manufacturer. The “CoolReaper” vuln has exposed over 10 million users to potential malicious activity. Palo Alto Networks reckons the malware was “installed and maintained by Coolpad despite objections from customers”.
Network security would be relatively simple if it weren't for end users. But just when IT...
The Institute of Technology at the University of Washington Tacoma, in...
Dakota county is creating the first local Electronic Crimes Task Force based in Minnesota. Ten...
SiQuest was voted "Industry Innovator 2014" by SC Magazine under the category of Analysis and Testing for the evaluation and performance of their new Internet Examiner® Toolkit forensic software.
Not long ago, mobile device forensics was a relatively straightforward process. Contact lists, SMS messages, and call logs were obtained and examined for evidence using specialized forensic technology. But with the blistering rate of advances in mobile technology, the explosion of mobile data and devices, times have drastically changed.
A newly published guidebook provides correctional administrators with a brief, yet comprehensive and informative, view of cell phone forensic technologies.
Phones from low-cost, third-tier vendors in Asia and Africa have been affected, but that doesn't mean it can't happen here.
The theft of trade secrets in U.S. businesses is increasing rapidly and is expected to double within the next decade, according to a recent report. These incidents and other suspicious behavior are the catalyst for lengthy, expensive forensic investigations. Digital forensic investigators will seek evidence from a wide array of devices and data sources, including mobile devices.
Newly discovered court documents from two federal criminal cases in New York and California that remain otherwise sealed suggest that the Department of Justice (DOJ) is pursuing an unusual legal strategy to compel cellphone makers to assist investigations.
A Danish citizen has had the dubious honor of becoming the first ever person to be convicted of selling spyware in the US.
With the release of Internet Evidence Finder v6.5, Magnet Forensics adds support for Windows Phone, and introduces new triage features including live system artifact recovery capabilities.
We live in a world today where individuals’ movements and locations are being recorded in many different ways. These movements and locations are commonly being used as evidence in civil, criminal, and domestic litigation. It is of paramount importance that anyone who is involved in litigation that uses cellular location evidence understands the appropriate and inappropriate use of this type of location data.
The mobile device industry is evolving very quickly. To stay current on the latest devices and the proper techniques for acquiring and analyzing data, smartphone and mobile device forensic analysis training courses are becoming more and more necessary.
It’s by no means complete yet, but the transition to a mobile IT environment in government is well established. Parallel with that, however, is the expectation that mobile communications will be able to deliver all that society expects in the way of seamless audio, video streaming and fast transfer of multi-megabyte data files.
Mobile security firm Lookout has discovered a more sophisticated variant of the NotCompatible Android botnet which it says targets enterprise networks through compromised mobile devices.
We live in a world today where individuals’ movements and locations are being recorded in many different ways. These movements and locations are commonly being used as evidence in civil, criminal and domestic litigation. It is of paramount importance that anyone who is involved in litigation that uses cellular location evidence understands the appropriate and inappropriate use of this type of location data.
The immensely popular Whatsapp instant messenger has the potential to become an even more attractive option for users, as the company has partnered with Open Whisper Systems to implement the latter's TextSecure protocol into their clients.
As digital devices continue to proliferate, digital storage capacities are approximately doubling every two years. The sheer amount of digital media being submitted for forensic analysis is overwhelming.
The National Institute of Standards and Technology is readying guidance to help agencies evaluate commercial mobile applications that agency workers might use on government-issued devices or personal apps that access government networks.
The Justice Department is collecting data from thousands of cellphones through high-tech gear deployed on airplanes that mimics communications towers, The Wall Street Journal has reported.
For most of the iPhone's lifespan, it's been effectively immune to malware. There were theoretical attacks and viruses targeting jailbroken phones, but thanks to the tight controls of the App Store, finding iOS malware in the wild has been nearly impossible. Yesterday, that changed.
The MobileSec RF Guardian cell phone blocker can block cell signal reception near a cell tower. It is perfect for both law enforcement and military digital forensics isolation of devices.
Wired and Forbes reported recently that the two largest cellphone carriers in the United States, Verizon and AT&T, are adding the tracking number to their subscribers' Internet activity, even when users opt out.
A Virginia circuit court judge has ruled that smartphone users can be compelled to give up their fingerprint, but not their passcodes, allowing police to search their devices.
Boot loaders are currently considered the most forensically sound physical extraction method. While they do involve loading a piece of code onto the device, this happens before the forensic tool accesses any evidentiary data. That’s because they replace the device’s normal boot loader, or the first set of operations that kick off the phone’s startup process and hand off to the main controlling program, like the operating system.
American Airlines Flight 136 from LAX to London was delayed recently after someone in the vicinity picked an inappropriate name for their Wi-Fi hotspot.
Samsung's Knox security software for Android devices handles passwords in a way that undermines encryption, an anonymous researcher says.
While revelations from Edward Snowden about the National Security Agency’s massive database of phone records have sparked a national debate about its constitutionality, another secretive database has gone largely unnoticed and without scrutiny.
- Page 1