Hold the phone… and the drone, and the GPS device, and the disk! Upon receiving MSAB’s software product XRY v9.4.3 and its compatible viewer, XAMN v6.1, we had full intentions of pulling out and dusting off a few of our
AD Enterprise allows investigators to collect, preserve and analyse data from various sources remotely from Windows and Mac computers, as well as to parse and review mobile data.
As a holistic tool which encompasses many features, Enterprise at its core
May 10th through the 14th of 2021, Amped Software offered a live online training course for their Amped FIVE Forensic Image and Video Enhancement product. This five-day beginner to intermediate level course was designed for investigators and forensic analysts looking
The first review of the Logicube Falcon®– NEO was performed in July 2018 and having successfully used the same unit in both an IT and forensic investigative environment since, it is time to update that assessment to include the many
In the pantheon of computer forensic analysis, practitioners are often faced with many problems that require innovative solutions. Every case or incident presents us with new challenges, new approaches, new work-arounds and new exploits. For many years, the practice of
I have been using Oxygen Forensic Detective for academic and professional investigations since 2016, when the last available version was 8.4. Mobile forensics procedures have evolved a lot. Mobile software and hardware, applications and the information stored in smart devices
Digital forensic practitioners have been largely focused on mobile devices since the advent of the smart phone. Through the virtually countless generations of Apple, Android, Blackberry, Windows and legacy phones, the forensic analysis community has learned that the data contained
Encryption, passwords, pass codes and other security measures are seemingly the ever-moving target in digital forensics. Whether your investigative focus is mobile devices and trying to bypass or obtain the pass code to collect valuable phone/tablet data; computer systems involved
by Jade James
Digital image forensics is a niche branch of digital investigations, and the tools used are aimed to support ‘blind’ investigations. Amped Authenticate is a software package designed for forensic authentication and tamper detection on digital photos. Authenticate
by Jade James
BlackLight is a simple but smart investigation tool which allows examiners to quickly analyse computer systems and mobile devices. Searching is made easy with advanced filtering to sift through large data sets. The tool is aimed at
by Jade James
AccessData Enterprise enables investigators to forensically image and analyse devices. It also provides a means of workflow analysis and documentation, as well as a level of staff management. The inclusion of FTK means that examiners can conduct
by Jade James
MSAB specialise in providing products and services solely for mobile device forensics. The flagship product, XRY, has been used for decades by forensic examiners and investigators to extract data quickly and efficiently, and now XAMN can be
by Jade James
ADF Digital Evidence Investigator PRO (DEI PRO) is a multi-purpose tool which can be used to collect files and artifacts on a multitude of digital devices, including computers, laptops, mobile devices and removable media. It includes all
by Jade James
MacQuisition is an effective 3-in-1 tool which provides the facility to acquire data live from a running system, as well as offering targeted data collection and forensic imaging. MacQuisition runs on Mac OS X and safely boots
by Jade James
Griffeye are currently offering a free 90-day trial of their flagship product, Analyze DI Pro, which includes access to the user portal and all the resources within it.
Analyze DI Pro comes with many benefits. You can
by Jade James
Oxygen Forensics specialise in mobile device, cloud, drone and IoT data extraction. Oxygen pride themselves in giving law enforcement, federal agencies and enterprises access to data at top speeds, providing advanced digital forensic data extraction and analytical
We Value Your Privacy
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional
Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional
Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.