Cellebrite, the global leader in Digital Intelligence (DI) solutions for the public and private sectors, today announced the launch of its Global Virtual Summit Series, Connect, taking place between October 20th through November 19th of this year. Cellebrite … Read more
Hello, and welcome to today’s webinar, Best Strategies for Remote Collections of Computer, Mobile and Cloud Data. My name is Colleen Nugent, and I am part of the marketing team here at Cellebrite, and I will be facilitating today’s call.
Information, both substantive and temporal, gleaned through a forensic data investigation may be critically important to the issues in a legal case. Thanks to today’s technologies and investigative methods, this important evidence has never been as precise, accurate, effective, detailed, and voluminous as it is today.
How confident are you in the results of your digital forensics tools and techniques? Can you measure that confidence or defend it in a court law?
Recently, we reported on two papers that described ways to reduce the risk of mistaken interpretations of digital evidence. Evaluating the uncertainty of evidence, the authors wrote, could bring more structure — and trust — to digital forensics.
What are Industrial Control Systems? Why are they important? How can an attacker attack them? What is control logic, engineering software, etc.? How does control logic forensics work?
Encryption, passwords, pass codes and other security measures are seemingly the ever-moving target in digital forensics.
Shahar, tell us about yourself, your role as VP Research, and Cellebrite’s Security Research Labs.
I have the outstanding honor to work with one of the most brilliant teams in our profession. I lead Cellebrite’s Security Research Labs, which are dedicated to unlocking, extraction and analysis research, and development.
Huawei is one of the three largest mobile device manufacturers. Their devices are based on processors from various manufacturers including MediaTek and Qualcomm. However, the most popular are based on the Huawei-developed processor family named Kirin. This presentation will guide … Read more
Since you joined Cellebrite, you’ve been focused on building the in-house training curriculum. What are the top three industry challenges you’ve faced in that time, and how did you overcome them?
The first challenge I initially faced when I joined … Read more
The release of BlackLight 10.2 includes new features and enhancements that will help investigators and examiners accelerate investigations in both the public and private sectors. In this webinar, our Cellebrite Forensic Engineers, Sarah Davis and Stephen Villere, will discuss, highlight, … Read more
The brute-force approach is the most time-consuming password recovery method. We are proud to share that we have introduced Mask attack that significantly reduces the time spent on password recovery by skipping unnecessary character combinations.
The new version of Passware … Read more
Information, both substantive and temporal, gleaned through a forensic data investigation may be critically important to the issues in a legal case. Thanks to today’s technologies and investigative methods, this important evidence has never been as precise, accurate, effective, detailed, … Read more
Logicube is the worldwide leader of hard drive duplication and forensic acquisition hardware, producing complete state of the art and extremely user friendly solutions for both industries. In 2018, Logicube engineered the Falcon-NEO. Known as one of the most powerful … Read more
There are some cases when data from major apps is not extracted by using the existing ADB backup and manufacturer backup.
1.Samsung devices with Android version 10 or higher
2. LG device with Android version 8 or higher
3. Devices … Read more