MENU

Posts Tagged ‘imaging’

Most Recent
 
Read More
2017-06-15

Hunting In Memory

The popularity of memory resident malware has steadily increased over time, possibly resulting from the proliferation of code and knowledge of in memory techniques. Perhaps this is due to the fact that reflects the popularity of the success of memory-based methods to avoid detection of security products and practitioners. Joe Desimone examines the most common of these methods of intruder memory in his article.

 

80
 
Read More
2017-04-25

Who is the owner of the mobile device?

Privacy is the basis of democracy. Therefore, sometimes support forensic software developers gets requests like this:

‘We need Software to identify the owner of smartphone & tablets regarding to the data on the phone to avoid deception. We are working for insurances that send us phones from customers who would like to recover their data. We would like to avoid with your software the customer who sends us the phone of someone else. If you have any ideas how I can do this.’

 

This article will tell how to identify the owner of a mobile device.

 

Who is the owner of the iOS device?

Before you know who the owner of the iPhone you [...]

1243
 
Read More
2017-04-12

Acquisition and Forensic Analysis of Apple Devices

Mobile devices of Apple such as iPhones and iPads are 15% of the mobile market. Therefore, it is often on research in forensic laboratories.

 

5280
 
Read More
2017-04-04

How to Make the Forensic Image of the Hard Drive

Digital devices are an integral part of our lives. Therefore, digital evidence, namely, evidence obtained from various digital devices, is increasingly used in investigations in the corporation or law enforcement to uphold your cybersecurity.

31697
Latest Headlines
 
Read More
929
 
Read More
474
 
Read More
922

Trending Topics
digital forensics
computer forensics
Articles
mobile forensics
DFIR
Android forensics
digital forensics software
windows forensics
forensic data recovery
Top Stories
 
 
Right Now
 
bstrings 1.0 released
Top Five
Heat Index
 
1
Decrypting encrypted WhatsApp databases without the key
 
2
How to Make the Forensic Image of the Hard Drive
 
3
Extracting data from SmartSwitch backups
 
4
Forensic tools for your Mac
 
5
Android forensic analysis with Autopsy

Get Help Now

Thank you for contacting us.
Your Digital Investigator will call you shortly.