You’ve already extracted data from a mobile device, you’re up against the clock and you’re trying to analyze large amounts of mobile device and app data. Where do you start?
Join us for a 30-minute free webinar and learn smart
In this video, we will introduce ‘Bootloader Pro’ extraction method which is capable of extracting Android 10 installed Samsung devices. Currently, MD-NEXT supports Galaxy S9(SM-G960N, SM-G960F)/Galaxy S9+(SM-G965N, SM-G965F)/Galaxy Note 9(SM-N960N) with Exynos chipset.
If you have any further inquiries, contact
by David Spreadborough, Amped Software
To help in setting the scene, let me tell you a story.
A young guy decided to steal a charity box from a post office. The theft itself could not be seen on the video,
by Brandon Epstein, Walter Bruehs, Bertram Lyons, and Dan Fischer
Video evidence is prolific in modern criminal investigations, and cell-phone video is one of the most prevalent ways video is captured [1]. While these silent witnesses can provide excellent investigative
by Christa Miller, Forensic Focus
When we published our March opinion piece, “When Digital Forensics Vendors Hire Research Talent, Where Does It Leave Research?” the reaction on Twitter — mostly from vendor representatives themselves — was swift and strong. While
When employers worldwide instituted remote-work policies to help reduce the spread of the novel coronavirus COVID-19, the impact to entire criminal justice systems — from law enforcement to evidence processing through the courts — was profound.
Digital evidence examiners in
by Patrick Siewert
Pro Digital Forensic Consulting is about to embark on its seventh year in full-time operation. It’s hard to believe that when I made the decision to transition from law enforcement to the private sector, my little company
by Christa Miller, Forensic Focus
Online digital forensics training has been around for a number of years, offered as a convenient alternative to in-person training for examiners who couldn’t travel or were otherwise resource-constrained. In an unforeseen twist, though, live
As more employees are required to work from home, we’ve heard from our customers that they need the ability to remotely collect data from Mac systems without having to send MacQuisition hardware to someone’s home. In order to help our
Welcome to Oxygen Forensic Detective’s Knowledge Nuggets. In this video we’re going to discuss decrypting WhatsApp messaging.
Let’s go over a few very important points that you need to consider before analyzing WhatsApp.
Number one: always place the device in
Welcome to Oxygen Forensic Detective’s knowledge nuggets. In this video, I will show you how simple it is to extract cloud data using Detective’s Cloud Extractor. If you weren’t already aware, Oxygen Forensic Detective has a lot more to it
‘17.5 Zettabytes.’ This is the amount of data that the IDC estimates will be generated annually by 2025, and among those numbers, cloud traffic is expected to grow and reach 18.9 Zettabytes by 2021.
This tremendous amount of cloud data
by Christa Miller
In the second half of 2019, a set of hirings made some waves in the digital forensics community. First, in July, Cellebrite hired well-known SANS Senior Instructor Heather Mahalik. Then in August, Mike Williamson joined Jessica Hyde,
by Oxygen Forensics
What’s Checkm8?
Checkm8 is an exploit (program exploiting OS or hardware vulnerabilities) aimed at obtaining access to the execution of its own software code at the earliest stage of iOS device loading.
What makes it stand out?
by Oleg Skulkin & Svetlana Ostrovskaya
Recently Microsoft finally released the Chromium-based version of Edge Browser, so it seems we’ll miss ESE databases soon (not). Of course, it may have a similar set of forensic artifacts to Chromium or Chrome,
by Christa Miller, Forensic Focus
Pattern of life analysis isn’t a new concept to anyone who’s ever been involved with intelligence, in particular surveillance. It’s all about the habits that people — suspects, persons of interest, crime victims, or those
We Value Your Privacy
We use technologies like cookies to store and/or access device information. We do this to improve browsing experience and to show (non-) personalized ads. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional
Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional
Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.