Articles

Cellebrite

How to Use The New App Genie – Physical Analyzer Series

By: Heather Mahalik - Senior Director of Digital Intelligence at Cellebrite In the two previous blogs in this series we covered, “How to Open A Case In Physical Analyzer” and “How to Do Quick-and-Easy Redactions in Physical Analyzer.” In this blog, we’re going to cover...
Read More »
Digit

Three Scottish Startups Join Tech Nation Cyber Programme

By: Ross Kelly Companies previously featured on the programme have seen considerable success, according to Tech Nation. Three of Scotland’s most exciting cybersecurity startups have been chosen to take part in Tech Nation’s Cyber 2.0 growth programme. Cyan Forensics, SnapDragon...
Read More »
Elcomsoft

Extracting Passwords from Microsoft Edge Chromium

by Oleg Afonin Last week, Microsoft Edge has become the second most popular desktop Web browser based on NetMarketShare usage figures. The new, Chromium-powered Edge offers impressive levels of customization and performance, much better compatibility with Web sites. The new...
Read More »
Belkasoft

Checkm8 Glossary

Checkm8 exploit made a big buzz recently since it opened doors to forensically sound acquisition of multiple models of iOS devices. Belkasoft have implemented checkm8-based approach in its Belkasoft Evidence Center mobile and computer forensics tool. In this article we would like to familiarize...
Read More »
Cellebrite

Cellebrite Increases Online Learning Capacity

Company Aims to Provide Flexible Learning Options to Digital Forensics Professionals Facing Travel Restrictions TYSONS CORNER, VA, March 19, 2020 – Cellebrite, the global leader in Digital Intelligence Solutions for the public and private sectors, today announced it is increasing its live online...
Read More »
Magnet

A Few Mac Artifacts You Should Be Paying Attention To

Since we announced our support of MacOS with AXIOM 3.0 in March 2019, we’ve continued to strengthen our support for Mac investigations with every release since then. With the release of AXIOM 3.11 around the corner—which will have support for even...
Read More »
MacObserver

Locked Apple Notes Aren’t as Secure as You Think

By Andrew Orr Forensic company BlackBag, a Cellebrite company, recently found that locked Apple Notes are temporarily stored in an insecure state. "Secure" Senior researcher Sarah Edwards found that Apple Notes locked with a password are “partially and temporarily unsecure.” She used...
Read More »
BlackBag Tech

BlackLight – Ingestion of Cellebrite Mobile Extractions

By Stephanie Thompson With the recent news of BlackBag joining Cellebrite, it seems like the appropriate time to share what we can already do together! Specifically, how to ingest Cellebrite acquisitions into BlackLight. With our latest BlackLight release, BlackBag added additional Cellebrite formats that can...
Read More »
Elcomsoft

Apple vs Law Enforcement: Cloudy Times

By Vladimir Katalov Just days ago, we have reviewed the data stored in iCloud, and studied its encryption mechanisms. We also discussed the discrepancies between the data that is stored in the cloud and the data that’s provided to the...
Read More »
EDRM & Cellebrite

EDRM Announces Cellebrite as Newest Global Partner

Setting the global standards for e-discovery, the Electronic Discovery Reference Model (EDRM) is pleased to announce Cellebrite, the global leader in Digital Intelligence Solutions for law enforcement, government and the enterprise market, as the newest “Preserver”-level partner, signing a three-year agreement. This...
Read More »
Cellebrite

Location Carving—A Key Driver For Solving Crimes

    By: Or Begam - Team Leader, Forensic Research Group and Natanel Alkalai - Research Technical Leader Whether you are identifying multinational fraud, uncovering criminal networks, or investigating a homicide, location information is vital to solving crimes. Here’s how investigative teams can...
Read More »
Belkasoft

What’s New in Belkasoft Evidence Center 2020 Version 9.9

Belkasoft Evidence Center 2020 v.9.9 (or, in short, BEC) is an all-in-one forensic solution, combining mobile and computer forensics as well as memory, cloud and remote forensics, and incident investigations in a single tool. Given its affordable price, it is one of the best choices among...
Read More »
ACE Lab

Apple FileVault Encryption: Issues and Solutions

Apple FileVault Encryption: Issues and Solutions by Roman Morozov, Head of Technical Support Department and NAND Data Recovery Instructor, ACE Lab FileVault is a high-end disk encryption program used in Mac OS X 10.3 and later. Most of Apple's products...
Read More »
Elcomsoft

iOS Device Acquisition with checkra1n Jailbreak

By Vladimir Katalov We’ve just announced a major update to iOS Forensic Toolkit, now supporting the full range of devices that can be exploited with the unpatchable checkra1n jailbreak.  Why is the checkra1n jailbreak so important for the forensic community, and what new...
Read More »
Cyan Forensics

GovTech Summit 2019 Win

By Rachel Goddard Cyan Forensics has been announced as the winner of PitchGovTech as part of the GovTech Summit 2019. The pitch competition took place as part of the GovTech Summit, where political leaders and start-up founders from across Europe...
Read More »
Securcube

Cell towers forensics: crime scene coverage survey

CASE STUDY The event took place in a suburb area of the town, not equipped with security cameras. No witness noticed the fact. How can investigators verify a suspect’s alibi according to the testimony? Investigators are able to start the...
Read More »
Cyan Forensics

Delivering Fast Forensics Triage for CAID

By David Toy Cyan Forensics is delighted to announce that it has been contracted to deliver the new Fast Forensics Triage capability for CAID (The UK’s Child Abuse Image Database), allowing forensic investigators to detect indecent images of children on a suspect’s device...
Read More »
Cellebrite

Samsung Exynos Chipset Support

By: Shahar Tal - VP Security Research Lab at Cellebrite UFED Ultimate 7.23 extends support for Samsung Exynos, which is featured in a wide variety of phones, from mid-range J and A series to the Flagship Galaxy S9. Exynos chipsets deliver next-generation mobile...
Read More »
Oxygen

Oxygen Forensic Key Scout

What is it? KeyScout is a utility built into Oxygen Forensic® Detective which uncovers and extracts user data, tokens and passwords from apps and web browsers as well as Wi-Fi hotspot passwords, iTunes backups, and operating system data on PCs running...
Read More »
Elcomsoft

iOS 12.4 File System Extraction

by Oleg Afonin The iOS 12.4 jailbreak is out, and so is Elcomsoft iOS Forensic Toolkit. Using the two together, one can image the file system and decrypt the keychain of iPhone and iPad devices running most versions of iOS (except...
Read More »
Atola

TaskForce drive identification

Published by Olga Milishenko Atola TaskForce is designed to perform multiple processes simultaneously and provide its users with unprecedented flexibility when it comes to a variety of devices and configurations in which they can be used. TaskForce also makes sure to...
Read More »
Magnet 3.5

MAGNET AXIOM 3.5 IS NOW AVAILABLE!

Magnet AXIOM 3.5 Includes Apple Warrant Returns and User Experience Improvements Get Magnet AXIOM 3.5 now—either within AXIOM or as a download over at the Customer Portal. In this release, we’ve added Apple warrant returns, new image categories in Magnet.AI, as...
Read More »
Teel

Disklabs Faraday Bags

Disklabs Faraday Bags State-of-the-art solutions for shielding technology from external interference Disklabs developed Faraday bags for law enforcement, intelligence agencies, military and computer forensics investigators to enable them to secure seizure, transportation and examination of portable digital devices. The Technology...
Read More »
Cyan Forensics

GovStart 2019 Launches at No 10.

GovStart 2019 Launches at No 10. David Toy Cyan Forensics was in No 10 Downing Street today meeting with senior advisors to the UK Prime Minister as part of the launch of GovStart 2019. Speaking at today’s launch, Ian Stevenson, Cyan...
Read More »
Oxygen

What is Facial Recognition?

What is Facial Recognition? Oxygen Forensics, Inc. Facial recognition systems are bio-metric technologies capable of identifying or verifying a person from a digital image or a video frame from a video source. Facial recognition can identify a person by analyzing...
Read More »
Cellebrite

Cellebrite- Image Classification Challenges and Solutions

Image Classification Challenges and Solutions By: Tola Waisman - Director of Technology, CTO at Cellebrite The prevalence of digital data in investigations means that investigators have to increasingly rely on advanced solutions, such as image classification, to help analyze the...
Read More »
Cyan Forensics

Winds of Change: The Power of Rapid Digital Triage

Winds of Change: The Power of Rapid Digital Triage 31st July 2019Kim Kingan Kim Kingan Kim Kingan brings nearly two decades of government policy and international strategy to team Cyan Forensics Kim specialises in governance, compliance, and change management programmes....
Read More »
Logicube

How to Streamline the Digital Evidence Collection Process

How to Streamline the Digital Evidence Collection Process Using Hardware-Based Digital Forensic Imaging Solutions in the Lab or On-Scene As a pioneer in the manufacture of hardware-based digital forensic imaging solutions, we are often asked about the advantages of hardware-based...
Read More »
BlackBag Tech

Searching Tips and Tricks in BlackLight

SEARCHING TIPS AND TRICKS IN BLACKLIGHT BY: ASHLEY HERNANDEZ Starting in BlackLight 2019 R1, customers have two methods for searching for words or patterns in case data.  This post will walk you through the basics of both types of searching,...
Read More »
Atola

Atola TaskForce 2019.7 with Web API for Automation

Atola TaskForce 2019.7 with Web API for Automation Published by Vitaliy Mokosiy We strongly believe that digital forensic world needs faster solutions to save your precious time, tackle routine tasks easily, and focus on what matters most. That’s why we have...
Read More »
ADF

Review-Mobile Device Investigator From ADF

Mobile Device Investigator From ADF by Jade James ADF Solutions is a leading provider of intelligent digital forensic and media exploitation software. ADF’s tools are used for the processing and analysis of computers, external drives, mobile devices and other media...
Read More »
OpenText

What’s New in OpenText Security

Pioneering solutions for the entire digital investigation life cycle  Sunali Sagar OpenText™ continues to address the needs of corporate and law-enforcement investigators around the world since its acquisition of the EnCase™ and Tableau line of products in late 2017. The following new...
Read More »
Elcomsoft

The Art of iPhone Acquisition

The Art of iPhone Acquisition July 9th, 2019 by Vladimir Katalov We all know how much important data is stored in modern smartphones, making them an excellent source of evidence. However, data preservation and acquisition are not as easy as...
Read More »
OpenText

Mobile and wearable device examination

Mobile and wearable device examination Identifying private browsing and wearable data activity with OpenText EnCase Carl Purser With the arrival of 5G technology, the increasing popularity of fitness trackers and smart watches, and growth in other “wearable tech”, the amount...
Read More »
BlackBag Tech

7 Time Saving Strategies for Investigators

7 TIME SAVING STRATEGIES FOR INVESTIGATORS BY: BLACKBAG TEAM While the amounts of data in typical digital forensic cases today is a lot different than it was several years ago, the amount of time most investigators have to do their...
Read More »
data narro

The Changing Face of Digital Evidence

By Kristian Lars Larsen Last month, Data Narro traveled to Chicago to participate in a panel discussion about the alteration of digital evidence, something that we deal with daily. After all, we are in the business of digital forensics and frequently deal in cases...
Read More »
google, security, privacy, guest

The complete list of alternatives to all Google products

The complete list of alternatives to all Google products: Parallel universe for the super security conscious By Sven Taylor With growing concerns over online privacy and securing personal data, more people than ever are considering alternatives to Google products. After all, Google’s...
Read More »
Cellebrite

Quickly Access and Act on Digital Data

Quickly Access and Act on Digital Data By: Muna Assi - Cellebrite Senior Product Marketing Manager With 85% of all police investigations involving digital data, investigators need a solution to surface key insights when minutes matter to expedite decision making...
Read More »
BBT & S21

BlackBag Technologies Announces Partnership With Semantics 21

We thought this news would interest the community. Two large companies coming together.   BlackBag Technologies Announces Partnership With Semantics 21 BlackBag Technologies announces a new partnership with Semantics 21, a digital forensics software company specializing in reviewing, analyzing and...
Read More »
DME

Inaccessible Data Recovery with DVR Examiner

We thought this article would be beneficial to the community. "The term “inaccessible to the DVR” is used to denote data which the DVR no longer has access to. It is often commonly referred to as “deleted”, however that is...
Read More »
Atola

Wiping 18 drives simultaneously with TaskForce

Wiping 18 drives simultaneously with TaskForce Published by Olga Milishenko With TaskForce, Atola introduced the fastest and most capable imaging engine to the forensic market. While cumulative imaging speed in TaskForce constitutes 15 TB/h, the engine is capable of wiping up...
Read More »
FB Like Button

What You Can Learn from IL v. Lorenzo Kent

by Page Vault Here at Page Vault, we talk a lot about the importance of web content authentication. Recently, we came across the IL v. Lorenzo Kent, 2017 IL App (2d) 140917, No. 2-14-0917 (Lorenzo Kent) opinion which reversed a first-degree...
Read More »
Information

Have We Lost the War on E-Discovery?

A great perspective we wanted to share with the community. Our whole purpose behind the community, is to keep information readily available. Craig has some great articles to read.   Have We Lost the War on E-Discovery? Posted by craigball Is there a...
Read More »
Semantics

West Midlands Firms Honoured in Queen’s Awards 2019

WEST MIDLANDS FIRMS HONOURED IN QUEEN’S AWARDS 2019 Midlands  Business West Midlands businesses operating in a broad range of industries, including a musical instrument manufacturer, an aviation finance specialist and a preventer of online fraud, have been named as winners of...
Read More »
BlackBag

Top 3 Features to Try in Blacklight 2019 R1

BlackBag Technologies newly released Blacklight, with new features we are sure some members will want to take advantage of.   TOP 3 FEATURES TO TRY IN BLACKLIGHT 2019 R1 BLACKBAG IS EXCITED FOR CUSTOMERS TO EXPERIENCE THE POWERFUL NEW FEATURES...
Read More »
C drive: Cipher

cipher.exe

  Over the years most forensic examiners have seen or had some experience with Cipher.exe the command line utility. Cipher the Windows program can be used to encrypt data or to destroy it beyond recovery. This article will describe the...
Read More »

Digital Forensic Community