Advertisement
 
Digital Forensic Software
Subscribe to Digital Forensic Software

The Lead

 The golden age of mobile forensics is over. There is no longer an easy way to get through the passcode in new iOS devices. Chip-off acquisition is dead due to full-disk encryption, while physical acquisition is dead since 64-bit devices and versions of i

The Future of Mobile Forensics

June 24, 2015 11:18 am | by Oleg Afonin, Danil Nikolaev and Yuri Gubanov | Articles | Comments

The golden age of mobile forensics is over. There is no longer an easy way to get through the passcode in new iOS devices. Chip-off acquisition is dead due to full-disk encryption, while physical acquisition is dead since 64-bit devices and versions of iOS 8 that cannot be jailbroken. Blackberries were highly resistant to chip-off acquisition from the beginning, and Android is getting there quickly. 

Device Seizure v7.1

June 18, 2015 8:45 am | by Paraben Corporation | Product Releases

Paraben has released DS v7.1. This new version added many major new features. Like, Malware...

Complex Smartphone Investigations Still Require Forensic Basics

June 17, 2015 11:26 am | by Ernie Austin, Associate Editor | Articles | Comments

Even after digital forensics has evolved enough to investigate the complexity of today’s...

Smartphone Forensics: Challenges of the Many and the One

June 12, 2015 11:27 am | by Ernie Austin, Associate Editor | Articles | Comments

Often people who work with computers and information develop an affinity for certain programming...

Digital forensic practitioners have many tools to conduct forensic investigations. Tools image hard drives, gather data from smartphones and pull information from the internet cloud. But, as those tools evolve, some of them bring forensic investigation in

Forensic, Security Convergence Found in Mobile Software Platform

June 10, 2015 12:51 pm | by Ernie Austin, Associate Editor | Articles | Comments

Digital forensic practitioners have many tools to conduct forensic investigations. Tools image hard drives, gather data from smartphones and pull information from the internet cloud. But, as those tools evolve, some of them bring forensic investigation into other areas, such as incident response and even security. 

P2 Commander v4.1

May 28, 2015 10:44 am | Paraben Corporation | Product Releases

P2C v4.1 adds OCR support in indexing, file viewing, and searching. It also adds an RTF report, EXIF info to reports, and more. P2C is a comprehensive digital forensic examination tool with special focus on email, chat logs, internet history, registry data, and more. Not only is P2C affordable, you receive free video training with every license.

The obvious path to acquire a Windows PC has always been “pull the plug, take the disk out, connect to an imaging device and collect evidence." Sound familiar? Well, in today’s connected world things do not work quite like that. In this article, we will h

Acquiring Windows PCs

May 19, 2015 9:07 am | by Oleg Afonin, Danil Nikolaev and Yuri Gubanov, Belkasoft | Belkasoft | Articles | Comments

The obvious path to acquire a Windows PC has always been “pull the plug, take the disk out, connect to an imaging device and collect evidence." Sound familiar? Well, in today’s connected world things do not work quite like that. In this article, we will have a look at measure the investigator has to take before taking the disk out, even before pulling the plug.

Advertisement

Magnet ACQUIRE

May 15, 2015 9:17 am | Magnet Forensics | Product Releases

Magnet Forensics has announced the beta availability of a new software product called Magnet ACQUIRE. The software is a smartphone acquisition tool that will allow you to quickly and easily acquire an image of any iOS or Android smartphone or tablet. 

Ensuring that digital content — whether it’s a short story by John Updike or a very rare audio recording of a vanished Native American language — lives on past its initial platform is one of the most pressing issues in preservation science. Harvard is one

Harvard Uses Forensics to Save Obsolete Digital Records

May 8, 2015 12:12 pm | by Kate Kondayen, Harvard university | News | Comments

Ensuring that digital content — whether it’s a short story by John Updike or a very rare audio recording of a vanished Native American language — lives on past its initial platform is one of the most pressing issues in preservation science. Harvard is one of a handful of cultural institutions in the first wave of adopting a technology and process to preserve its digital content.

Wherever I get vmdk files, I take a deep breath and wonder what issues might pop up with them. I recently received some vmkd files and when I viewed one of these in FTK Imager (and some other mainstream forensic tools), it showed up as the dreaded "unreco

Dealing With Compressed vmdk Files

May 5, 2015 12:27 pm | by Mari DeGrazia | Blogs | Comments

Wherever I get vmdk files, I take a deep breath and wonder what issues might pop up with them. I recently received some vmkd files and when I viewed one of these in FTK Imager (and some other mainstream forensic tools), it showed up as the dreaded "unrecognized file system."

In this article, we will have a look at how Windows-based portable electronic devices are different from traditional laptops and desktops, review new security measures and energy saving modes presented by Windows tablets, and discuss hardware, methods and

Capturing RAM Dumps and Imaging eMMC Storage on Windows Tablets

May 5, 2015 8:10 am | by Oleg Afonin, Danil Nikolaev and Yuri Gubanov | Belkasoft | Articles | Comments

In this article, we will have a look at how Windows-based portable electronic devices are different from traditional laptops and desktops, review new security measures and energy saving modes presented by Windows tablets, and discuss hardware, methods and tools we can use to acquire the content of their RAM and persistent storage.

Magnet IEF

May 4, 2015 8:30 am | Magnet Forensics | Product Releases

Magnet Forensics has released Magnet IEF v6.6. This release adds a number of new and advanced analysis features to IEF that will aid examiners in locating and validating recovered data. These features include Hex Viewer, Text Viewer, Profile development capabilities, Partial Artifact filter, Histogram View, and Examiner/Investigator Modes.

Advertisement
Before purchasing any tool, users should thoroughly research those available and select the tool which provides the best functionality to meet their requirements. The listing of a particular tool or vendor is not to be construed as an endorsement of that

Data Sanitization: Part 2

April 28, 2015 4:40 pm | by John J. Barbara | Articles | Comments

Before purchasing any tool, users should thoroughly research those available and select the tool which provides the best functionality to meet their requirements.

Nuix 6.2

April 24, 2015 8:09 am | Nuix | Product Releases

Nuix 6.2 is a major release of the Nuix Engine, our eDiscovery and Investigator products, and our Director and Web Review & Analytics web applications. It includes a vast range of new features and capabilities that will benefit all Nuix customers and partners.

Internet Examiner Toolkit v5

April 21, 2015 8:39 am | SiQuest Corporation | Product Releases

SiQuest has released Internet Examiner Toolkit (IXTK) Version 5. With this next generation of software, IXTK features FaceDNA, a sophisticated biometric facial recognition add-on (included at no additional cost) to their Internet Examiner Tookit.

UFED Field Series

April 10, 2015 8:09 am | by Cellebrite | Cellebrite | Product Releases

The UFED Field solution components unify workflows between the field and lab, reducing backlogs by enabling networked collaboration and analysis across the entire investigative team. This new suite of software and hardware solutions enables personnel at every level to efficiently gather, process and act on the critical data that will help speed investigations.

UFED Pro Series

April 9, 2015 8:22 am | by Cellebrite | Cellebrite | Product Releases

The UFED Pro Series is designed for forensic examiners and investigators who require the most comprehensive, up-to-date mobile data extraction and decoding support available to handle the rapid influx of new devices and data sources. Flexible and scalable to meet all operational needs and lab environments, it features industry trusted tools and analysis capabilities.

Advertisement
A new tool funded by DARPA promises to detect flaws in software before release to the general public.

DeepCode Tool Detects Software Flaws Before Release

March 19, 2015 8:08 am | by Charlie Osborne | Blogs | Comments

A new tool funded by DARPA promises to detect flaws in software before release to the general public.

SQLite is a popular database format that is used extensively. Both iOS and Android employ SQLite as a storage format of choice, with built-in and third-party applications relying on SQLite to keep their data. A wide range of desktop and mobile Web browser

Forensic Analysis of SQLite Databases: Free Lists, Write Ahead Log, Unallocated Space and Carving

March 17, 2015 8:57 am | by David Makeev, Nikita Timofeev, Oleg Afonin and Yuri Gubanov | Belkasoft | Articles | Comments

SQLite is a popular database format that is used extensively. Both iOS and Android employ SQLite as a storage format of choice, with built-in and third-party applications relying on SQLite to keep their data. A wide range of desktop and mobile Web browsers (Chrome, Firefox) and instant messaging applications use SQLite, which includes newer versions of Skype, WhatsApp, iMessage and many other messengers.

In cooperation with children's rights organization Terre des Hommes, in upgrading Sweetie 1.0, the virtual minor girl that identified thousands of pedophiles on the internet, researchers are working on a new method (Sweetie 2.0) with which potential perpe

Software Spots Online Child Sex Abuse

March 12, 2015 9:27 am | by Tilburg University | News | Comments

In cooperation with children's rights organization Terre des Hommes, in upgrading Sweetie 1.0, the virtual minor girl that identified thousands of pedophiles on the internet, researchers are working on a new method (Sweetie 2.0) with which potential perpetrators of webcam sex with children on the internet can be more easily traced.

After listening to colleagues for years and exploring it further, Jonathan Grier saw how pressing the need was for technology like his. Although the NIJ was the organization that bridged the gap between idea and practical application for his technology, i

The Possible Put Into Digital Forensic Practice With Grier Technology

February 18, 2015 12:44 pm | by Ernie Austin, Associate Editor | Articles | Comments

After listening to colleagues for years and exploring it further, Jonathan Grier saw how pressing the need was for technology like his. Although the NIJ was the organization that bridged the gap between idea and practical application for his technology, it was another agency that saw its possibility.

Depending upon the nature of investigations, timely forensic examinations normally can expedite the apprehension of suspects. The use of a triage tool can identify the most likely evidentiary data sources. Ideally, the relevant evidence should then be sea

Streamlining the Digital Forensic Workflow: Part 3

February 17, 2015 1:12 pm | by John J. Barbara | Digital Forensics Consulting, LLC | Articles | Comments

Depending upon the nature of investigations, timely forensic examinations normally can expedite the apprehension of suspects. The use of a triage tool can identify the most likely evidentiary data sources. Ideally, the relevant evidence should then be seamlessly exported and analyzed in-depth by another comprehensive forensic tool which can provide indexing and detailed analysis.

In the second part of our discussion about the benefits of government contracts to digital forensic investigation, Forensic Magazine talks to Jonathn Grier, principle of Grier Forensics. Grier's sifting technology speeds the investigation of computer hard

Grier Forensics Sifts Through the Data

February 11, 2015 12:31 pm | by Ernie Austin, Associate Editor | Articles | Comments

In the second part of our discussion about the benefits of government contracts to digital forensic investigation, Forensic Magazine talks to Jonathan Grier, principle of Grier Forensics. Grier's sifting technology speeds the investigation of computer hard drives by pinpointing usable data — the data important to a case. In this part, we find out from Jonathan Grier how this technology works.

It is often the case that the spur to innovation in America takes the form of a government solicitation. As an instrument of the people, the government gives power to the those that develop ideas and tools that benifit everyone. Forensic tools are no exce

Government Contract to Grier Forensics Speeds-Up Digital Investigation

February 9, 2015 11:54 am | by Ernie Austin, Associate Editor | Articles | Comments

It is often the case that the spur to innovation in America takes the form of a government solicitation. As an instrument of the people, the government gives power to the those that develop ideas and tools that benefit everyone. Forensic tools are no exception. To this end, Forensic Magazine spoke with Martin Novak, Program Manager at NIJ, and Jonathan Grier, principle of Grier Forensics, about Grier's recent contract award.

Nuix will include powerful email threading capabilities at no additional cost in the upcoming 6.2 release of its eDiscovery software. This makes Nuix a viable long-term alternative for Equivio users who are concerned that Microsoft may discontinue the pro

Nuix Safe Bet against Equivio's Uncertain Future

February 3, 2015 11:02 am | Nuix | News | Comments

Nuix will include powerful email threading capabilities at no additional cost in the upcoming 6.2 release of its eDiscovery software. This makes Nuix a viable long-term alternative for Equivio users who are concerned that Microsoft may discontinue the product after finalizing its acquisition of the company.

Sheriffs are campaigning to pressure Google Inc. to turn off a feature on its Waze traffic software that warns drivers when police are nearby. They say one of the technology industry's most popular mobile apps could put officers' lives in danger from woul

Sheriffs Want Popular Police-tracking App Disabled

January 27, 2015 8:08 am | by Eileen Sullivan, Associated Press | News | Comments

Sheriffs are campaigning to pressure Google Inc. to turn off a feature on its Waze traffic software that warns drivers when police are nearby. They say one of the technology industry's most popular mobile apps could put officers' lives in danger from would-be police killers who can find where their targets are parked.

Forensic Magazine’s Readers’ Choice Awards for the Best Forensic Products of the Year celebrate excellence in product design and performance for tools, equipment, and materials used in all areas of forensic investigation and analysis. A panel of Forensic

Best Forensic Products of 2014

December 15, 2014 8:44 am | by Rebecca Waters | Articles | Comments

Forensic Magazine’s Readers’ Choice Awards for the Best Forensic Products of the Year celebrate excellence in product design and performance for tools, equipment, and materials used in all areas of forensic investigation and analysis. A panel of Forensic subscribers selected the products that they found to be most effective and trusted in their work. Congratulations to our winners!

It has now reached the point that it is no longer practical for an examiner to forensically analyze each and every piece of evidence. Depending upon the alleged crime, often the incriminating evidence can be found in an e-mail, a document, the browser his

Streamlining the Digital Forensic Workflow: Part 1

October 15, 2014 8:51 am | by John J. Barbara | Articles | Comments

It has now reached the point that it is no longer practical for an examiner to forensically analyze each and every piece of evidence. Depending upon the alleged crime, often the incriminating evidence can be found in an e-mail, a document, the browser history, an SMS, or some other source. This leads to the obvious conclusion that examiners are going to need a new approach to streamline their workflow.

Streamlining the Digital Forensic Workflow: Part 2

September 30, 2014 5:18 pm | by John J. Barbara | Digital Forensics Consulting, LLC | Articles | Comments

Often an examiner will analyze all the digital media only to determine that the probative data was limited to a browser’s history file, an e-mail, a document, the mobile devices’ logs, or an inappropriate graphic video or picture. Finding the critical probative data faster in a cost effective manner while reducing or eliminating case backlogs is going to require a more efficient methodology.

Advertisement
X
You may login with either your assigned username or your e-mail address.
The password field is case sensitive.
Loading