What You Need to Know Now About macOS 13 and iOS 16

Julia O’Shea: Good morning, good afternoon, good evening, everyone. Thanks for joining our webinar today: What You Need To Know Now About macOS 13 and iOS 16. I’m Julie O’Shea, and I’m the Product Marketing Manager here at Cellebrite Enterprise

Oxygen Forensics Leads the Industry With Innovative Features in New Release

Oxygen Forensics, a global leader in digital forensics for law enforcement, federal agencies, and corporate clients, announced today the release of the latest version of the all-in-one digital forensic solution, Oxygen Forensic® Detective v.14.5. This version dramatically enhances mobile data

Checkm8 Acquisition Method in Oxygen Forensic Detective 14.3

We first added checkm8 acquisition from iOS devices in Oxygen Forensic® Detective v.12.6 in July of 2020. Not surprisingly, many things have changed since then. That being the case, we updated our tool several times over the last few months

A Deep Dive into Apple Keychain Decryption

When it comes to the forensic investigation of Apple devices, a Keychain analysis is of particular importance. Not only does Keychain contain passwords from websites and applications, but it can also provide computer forensics with access to the same user’s

How To Parse AirDrop Artifacts In Magnet AXIOM

Hey everyone, Trey Amick from Magnet Forensics here. Today we’re going to be looking at a new set of artifacts specific to Mac investigations, which will be released as part of the AXIOM 3.8 release. Today we’re going to be

How To Boot Scan A Mac With APFS And FileVault 2

Hi, I’m Rich Frawley and I’m the Digital Forensic Specialist with ADF Solutions. Today we are going to conduct a boot scan of a MacBook Air that has APFS and FileVault 2 enabled. At this point you have decided on

Jailbreaking iOS 11 And All Versions Of iOS 10

by Oleg Afonin, Mobile Product Specialist at ElcomSoft Jailbreaking iOS is becoming increasingly difficult, especially considering the amounts of money Apple and independent bug hunters are paying for discovered vulnerabilities that could lead to a working exploit. Late last year,

Man In The Middle Attack: Forensics

Yes, that’s right! Mr. Upset did not post ‘I am hating my new job’ as it appears in Figure 2, instead he wrote ‘I am loving my new job’. Then how did it happen and who did it? This article