Remote Acquisition With Magnet AXIOM Cyber

Hey, everyone, Trey Amick from Magnet Forensics here, and today I’m excited to walk through AXIOM Cyber’s network acquisition features. With the recent release of AXIOM Cyber we now have the ability to complete remote endpoint collections, as well as … Read more

Traceless Data Extraction From MEGA Cloud

MEGA is an encrypted cloud storage service that allows users to chat with other users, have group video and voice calls, backup photos and videos, and synchronize files. Users may do so between trusted devices or share them privately, on … Read more

Joshua Smith, Training Instructor, Oxygen Forensics

Joshua, you recently transitioned from a U.S. Army career to the private sector. Tell us a little more about what first drew you to digital forensics.

I got started in digital forensics in 2007, while working as a Special Agent … Read more

How To Extract Credential Data Using KeyScout

Hello, this is Keith Lockhart from Oxygen Training, and this video is going to discuss the KeyScout application.

The KeyScout application is one of the tools available in the tool suite concept of the Forensic Detective product. KeyScout is a … Read more

Remote Forensics Of Windows 10 Mobile Devices

by Oleg Afonin, Elcomsoft

Microsoft has developed Windows 10 as the one OS for all types of devices from servers to wearables. Desktops, laptops, two-in-ones, tablets and smartphones can (and do) run a version of Windows 10. There are countless … Read more

Current Challenges In Digital Forensics

Current Challenges in Digital Forensics

What is the most urgent question facing digital forensics today? That in itself is not a question with a straightforward answer. At conferences and in research papers, academics and forensic practitioners around the world converge to anticipate the future of … Read more

Peering Through The Cloud

by Shahaf Rozanski

256px-Cloud_computing_icon.svgObscured by clouds

With there now being more mobile phones on the planet than people and smartphones set to achieve saturation in just 10 years, unlocking the data held on them has increasingly needed to be used … Read more

The Future of Mobile Forensics: November 2015 Follow-Up

by Oleg Afonin, Danil Nikolaev, Yuri Gubanov

Mobile forensics is a moving target. In our recent article, “The Future of Mobile Forensics”, we described acquisition techniques that used to be state-of-the art back then. Weeks later, some things had changed … Read more

Analysis Of iOS Notes App

As part of my third year studying Digital Security,Forensics & Ethical Hacking at GCU, I took part in a group research project to study the artifacts created when using the notes app on an iPad Mini, and if they could … Read more

Share to...