The Future of Mobile Forensics
by Oleg Afonin, Danil Nikolaev & Yuri Gubanov © Belkasoft Research 2015 Most would agree that the golden age of mobile forensics is over. There is no longer an easy way to get through the passcode...
View ArticleThe Future of Mobile Forensics: November 2015 Follow-Up
by Oleg Afonin, Danil Nikolaev, Yuri Gubanov Mobile forensics is a moving target. In our recent article, “The Future of Mobile Forensics”, we described acquisition techniques that used to be...
View ArticleMeeting A Forensic Challenge: Recovering Data From A Jolla Smartphone
by Davide Gabrini, Andrea Ghirardini, Mattia Epifani and Francesco Acchiappati Preface During the hacking camp MOCA 2016, at the end of a talk held by Davide “Rebus” Gabrini on passcode circumvention...
View ArticleMobile Forensics Monkey Wrench: iOS 10.2 and Encryption
by Patrick Siewert, Pro Digital Forensic Consulting It’s not secret to those involved in the study and practice of mobile forensics that Apple likes to throw us curve balls with almost every new...
View ArticleUnlocking The Screen of an LG Android Smartphone with AT Modem Commands
by Oleg Davydov, CTO, Oxygen Forensics Modern smartphones are much more than just a device for voice calls. Now they contain a lot of personal data – contact list, communication history, photos,...
View ArticleSamsung sBrowser – Android Forensics: A Look Into The Cache Files
by Robert Craig and Michael Lambert Abstract Samsung devices are a large portion of the Android OS market. Samsung has its own Internet Browser, “sbrowser”, installed onto their devices. All web...
View ArticleInternet Of Things Mobility Forensics
by K M Sabidur Rahman & Matt Bishop (University of California Davis) and Albert Holt (NSA) Abstract The Internet of Things (IoT) comes with great possibilities as well as major security and privacy...
View ArticleRemote Forensics Of Windows 10 Mobile Devices
by Oleg Afonin, Elcomsoft Microsoft has developed Windows 10 as the one OS for all types of devices from servers to wearables. Desktops, laptops, two-in-ones, tablets and smartphones can (and do) run a...
View ArticleCellular GPS Evidence: Waze + Cellebrite + CellHawk
by Patrick Siewert, Principal Consultant, Pro Digital Forensic Consulting It’s becoming common knowledge that location evidence on cellular devices can provide a wealth of evidence in any number of...
View ArticleNew Security Measures In iOS 11 And Their Forensic Implications
by Oleg Afonin, Elcomsoft Apple is about to launch its next-generation iOS in just a few days. Researching developer betas, we discovered that iOS 11 implements a number of new security measures. The...
View ArticleADR512 Testing
by Andrey Fedorov The purpose of this article is to find additional information about the capabilities, specifics, and USPs of the ADR512 Android Data Recovery program. A full description of this...
View ArticleMobile Virtual Network Operators (MVNOs) In The US
by Patrick Siewart Increasingly, cellular records and their associated location information are being used in civil litigation, where previously they were considered to be a “law enforcement only”...
View ArticleRecap: Techno Security And Digital Forensics Conference Myrtle Beach 2019
by Christa Miller, Forensic Focus The oldest of the trio of Techno Security and Digital Forensics Conferences, the Myrtle Beach event marked its 21st year this June 2-5. More than 900 people...
View ArticleTechno Security & Digital Forensics 2019 – San Antonio Sept 30 – Oct 2
From the 30th of September to the 2nd of October 2019, Forensic Focus will be attending the Techno Security & Digital Forensics Conference in San Antonio, TX, USA. If there are any topics you’d...
View ArticleHow To Acquire Mobile Data With MD-NEXT From HancomGMD
by Michelle Oh, HancomGMD With an ever-increasing range of features and dramatically increased storage capacity, digital devices have become essential to our daily life. Their ability to store vast...
View ArticleFour Critical Success Factors In Mobile Forensics
by Mike Dickinson, Deputy Executive Officer at MSAB The purpose of this paper is to encourage mobile forensic practitioners to consider a wider number of critical factors surrounding their choice and...
View ArticleUses Of Unmanned Aerial Vehicles (UAVs) In Crime Scene Investigations
by Chirath De Alwis and Chamalka De Silva Recent advancements in technology have helped many people to have a better quality of life. Unmanned Aerial Vehicles (UAVs), also known as ‘drones’, are one...
View ArticleWalkthrough: What’s New In XAMN v4.4
Hello and welcome to this video about what’s new in XAMN 4.4. I’m going to take you through ten new improvements, as you can see listed here in the latest release of the XAMN application. Let’s get...
View ArticleCost-Effective Tools For Small Mobile Forensic Labs
by Alex Moeller As the costs associated with running a mobile devices forensic laboratory can be considered to be high, this article is aimed at providing alternative options for small organisations or...
View ArticleThree Reasons Why Call Detail Records Analysis Is Not “Junk Science”
by Patrick Siewert, Principal Consultant, Pro Digital Forensic Consulting Since introducing our private sector clients to the impact that cellular call detail records (CDR) analysis & mapping can...
View Article