Rich Frawley from ADF Solutions discusses the use of screenshots and screen recording in mobile device investigations. Screenshots and screen recordings can be used to capture evidence that may not be available through logical acquisitions, allowing investigators to add valuable
FF: Tell us about your background and how you ended up in your current role.
Before joining MSAB, I worked in the IT sector as a systems engineer, as part of a small but very talented technical team. Among other
Monica Harris from Cellebrite talks to Forensic Focus about new products and developments in the field of digital forensics, including the importance of staying connected to the community and understanding their needs.
Cellebrite has recently launched several new products, including
Magnet Forensics Inc., a developer of digital investigation solutions for more than 4,000 enterprises and public safety agencies in over 100 countries, announced today that it has acquired the strategic IP assets of High Peaks Cyber, a business dedicated to
Continuing to add to the Android support for Magnet GRAYKEY, Magnet Forensics is thrilled to announce the addition of Google Pixel series 6 and 8 to our list of supported mobile devices, which includes the Pixel 6a and Pro models
In the realm of mobile forensics, iTunes backups have long been a common method for extracting data from iOS devices. However, the increasing sophistication of mobile devices and the evolving landscape of digital evidence have exposed the limitations of iTunes
Cellebrite Enterprise Solutions has launched a new SaaS product called Endpoint Mobile Now, which allows for remote targeted collection of mobile data. The SaaS solution eliminates the complexity of traditional enterprise-level mobile data collection by providing a simple and scalable
Investigative teams face a growing challenge in today’s fast-paced, data-driven world: how to keep up with the ever-increasing volume and complexity of digital evidence. The sheer volume of data stored on mobile devices, coupled with the sophistication of encryption and
Cellebrite has recently launched several new products, including Endpoint Mobile Now, a SaaS solution for the patent pending remote collection of targeted data on iOS and Android devices. Another new product is Mobile Ultra, a mobile forensics solution that provides
Si and Desi interview Rich Frawley from ADF Solutions. They discuss the use of screenshots and screen recording in mobile device investigations. Screenshots and screen recordings can be used to capture evidence that may not be available through logical acquisitions,
Monica Harris, Product Business Manager at Cellebrite Enterprise Solutions, discusses tips and tricks for collecting employee chat data. She highlights the increasing importance of collecting data from mobile devices, particularly chat data, which has surpassed email data collection.
Samsung is a popular vendor in forensic investigations, second only to Apple.
Passware Kit Mobile 2024 v1 has expanded its capabilities by introducing password recovery and data extraction for Samsung MediaTek-based devices, in addition to the Exynos and Qualcomm-based devices
Discover the latest enhancements in MD-Series released in October.
Key updates include MD-NEXT’s advanced mobile data extraction through new extraction accessory MD-PLUG. Plus, the Home screen user interface has been refreshed for improved usability.
MD-RED offers data analysis including the
Rich Frawley: All right, good day everybody, and welcome to our webinar, Enhancing Mobile Investigations, and we’re going to specifically focus on screenshots and screen recordings today. So with that, I’m just going to give you a couple seconds here
We Value Your Privacy
We use technologies like cookies to store and/or access device information. We do this to improve browsing experience and to show (non-) personalized ads. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional
Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional
Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.