The Evolution Of E-Crime: From Hacking To Cyberwarfare

The dawn of the digital age brought with it a new breed of criminal – the cybercriminal. As computers and the internet became more ubiquitous in business and personal life, those with malicious intents saw opportunities to exploit these new

How To Use The Macroblocks Filter In Amped FIVE

In this latest article, David Spreadborough, a Forensic Analyst at Amped Software, looks at why compression is a factor when analyzing video before giving us a run-through of the Macroblocks filter in Amped FIVE. Read on to learn more. You

How To Screenshot Mobile Evidence With Mobile Device Investigator 

Cell phones are used for communication, entertainment, and even as essential tools for work. With the widespread usage of smartphones, law enforcement, and digital forensics professionals have recognized the significance of capturing digital evidence from these devices. By taking screenshots,

Extracting Google Chrome Using Android Agent

Hey there everyone. It’s Ryan from your Oxygen Forensics training team, and today what we’re going to discuss is using our Android agent to collect Google Chrome data as a third party app on our Android devices. This is going

How To Review Mobile Forensics Evidence With Mobile Device Investigator

Data analysis can quickly become overwhelming without proper organization tools. Extracting, analyzing, and reporting on this data efficiently is of paramount importance to investigators.  Mobile Device Investigator (MDI), the analysis section of Mobile Device Investigator, is an invaluable asset for

Using The Maps Activity Matrix In Oxygen Forensic® Detective

Ryan: Hey everyone. Ryan here from your Oxygen Forensic training team, and in today’s video we’re going to discuss a new feature found in our Oxygen Forensic Maps. As we know, there’s multiple ways to access our Oxygen Forensic Maps

A Brief History Of Time … Stamps

by Chris Atha, High-Tech Crime Specialist at the National White Collar Crime Center (NW3C) In an earlier article, the concept of relative time as it relates to computing devices and the memorialization of time was discussed, as was how to recognize

How To Preview Evidence On A Mobile Device

As smartphones continue to play an ever-increasing role in our lives, law enforcement, and digital forensics professionals are faced with the challenge of efficiently extracting and processing information from these devices. This is where  Mobile Device Investigator (MDI)  comes into

How To Conduct Mobile Setup With Mobile Device Investigator

Investigators face the daunting task of analyzing vast amounts of digital data to uncover critical evidence. To streamline this process,  Mobile Device Investigator (MDI)  offers an indispensable feature known as “Search Profiles.” These profiles empower investigators to tailor their search

Prioritization At Binalyze

Here at Binalyze, as in any product team, one of our biggest challenges in product development is prioritization. The decisions about where to focus our energies and the general order of our work impact a large number of our teams.

How To Scan A Mobile Device With Mobile Device Investigator

In today’s digital age, mobile devices have become an integral part of our lives. They store a wealth of personal information, making them an attractive target for malicious actors. Whether you’re an investigator, a digital forensics expert, or simply concerned

Automated Compromise Assessment With DRONE

DRONE is AIR’s built-in automated compromise assessment technology which dramatically reduces the time required to identify IOCs in a DFIR investigation and begin containment and remediation. DRONE flies above your live systems and data acquisitions to deliver an unparalleled decision