How To Parse AirDrop Artifacts In Magnet AXIOM
Hey everyone, Trey Amick from Magnet Forensics here. Today we’re going to be looking at a new set of artifacts specific to Mac investigations, which will be released as part of the AXIOM 3.8 release....
View ArticleForensic Focus Legal Update December 2019 – Part II: Search And Seizure
by Christa Miller In cooperation with the National White Collar Crime Center (NW3C) and SEARCH, The National Consortium for Justice Information and Statistics, Forensic Focus offers a quarterly roundup...
View ArticleHow To Analyze Call Data Records In Oxygen Forensic Detective
Hi, this is Amanda Mangan with Oxygen Forensics. In this video, we’re going to go over Oxygen Forensics’ Call Data Expert. The first thing we’ll discuss is, what exactly is a CDR? A CDR is a call data...
View ArticleIndustry Roundup: Cloud Forensics
by Christa Miller Only a few short years ago, the idea of recovering forensic data from the cloud seemed like either troubling overreach, or unnecessarily redundant given the availability of evidence...
View ArticleTechno Security & Digital Forensics 2020 – San Diego March 9-11
From the 9th to the 11th of March 2020, the Techno Security & Digital Forensics Conference will be running in San Diego, CA. If there are any topics you’d particularly like us to cover, or any...
View ArticleNIST Tests Forensic Methods For Getting Data From Damaged Mobile Phones
by Richard Press Criminals sometimes damage their mobile phones in an attempt to destroy evidence. They might smash, shoot, submerge or cook their phones, but forensics experts can often retrieve the...
View ArticleForensic Pattern Of Life Analysis
by Christa Miller, Forensic Focus Pattern of life analysis isn’t a new concept to anyone who’s ever been involved with intelligence, in particular surveillance. It’s all about the habits that people —...
View ArticleChromium-Based Microsoft Edge From A Forensic Point Of View
by Oleg Skulkin & Svetlana Ostrovskaya Recently Microsoft finally released the Chromium-based version of Edge Browser, so it seems we’ll miss ESE databases soon (not). Of course, it may have a...
View ArticleEverything You Ever Wanted To Ask About Checkm8 And Checkra1n
by Oxygen Forensics What’s Checkm8? Checkm8 is an exploit (program exploiting OS or hardware vulnerabilities) aimed at obtaining access to the execution of its own software code at the earliest stage...
View ArticleOpinion: When Digital Forensics Vendors Hire Research Talent, Where Does It...
by Christa Miller In the second half of 2019, a set of hirings made some waves in the digital forensics community. First, in July, Cellebrite hired well-known SANS Senior Instructor Heather Mahalik....
View ArticleHow To Acquire Cloud Data With MD-CLOUD
‘17.5 Zettabytes.’ This is the amount of data that the IDC estimates will be generated annually by 2025, and among those numbers, cloud traffic is expected to grow and reach 18.9 Zettabytes by 2021....
View ArticleHow To Extract Cloud Data Using Oxygen Forensic Detective’s Cloud Extractor
Welcome to Oxygen Forensic Detective’s knowledge nuggets. In this video, I will show you how simple it is to extract cloud data using Detective’s Cloud Extractor. If you weren’t already aware, Oxygen...
View ArticleHow To Decrypt WhatsApp Messages With Oxygen Forensic Detective
Welcome to Oxygen Forensic Detective’s Knowledge Nuggets. In this video we’re going to discuss decrypting WhatsApp messaging. Let’s go over a few very important points that you need to consider before...
View ArticleHow To Collect Data Using MacQuisition Live
As more employees are required to work from home, we’ve heard from our customers that they need the ability to remotely collect data from Mac systems without having to send MacQuisition hardware to...
View ArticleIndustry Roundup: Online Digital Forensics Training
by Christa Miller, Forensic Focus Online digital forensics training has been around for a number of years, offered as a convenient alternative to in-person training for examiners who couldn’t travel...
View Article