How to analyze different types of devices and find connections between them
Modern digital forensics and incident response cases may involve quite different types of devices. The variety of electronic…
Modern digital forensics and incident response cases may involve quite different types of devices. The variety of electronic…
Smartphones and tablets are widely used in everyday life and in various technological processes. For this reason, they often…
The checkm8 exploit for iOS devices emerged in September 2019. It opened new doors for digital forensics researchers and inv…
On Marth 24th Telegram released a new version of their messenger, and introduced a new feature – ability “to delete an…
The 2nd edition of Learning Android Forensics by Oleg Skulkin, Donnie Tindal and Rohit Tamma has been released. Here is the …
Alexis Brignoni has written a script for parsing all the logs in the /private/var/installd/Library/Logs/MobileInstalation/.l…
There are millions of applications that can be used on a smartphone. This mini webcast with Terrance Maguire outlines an app…
Mobile devices investigation is a challenging field for forensic analysts, especially due to the increasing amount of data e…
This webcast explores the following topics: 1) Choosing the best test device 2) Rooting your Android 3) Utilizing File Brows…
Here’s Brian Carrier’s presentation from Open Source Digital Forensics Conference (OSDFCon) 2018. In the present…
Login