Looking Back on 2017 with Adam Belsher, CEO of Magnet Forensics
As we conclude the biggest year yet for Magnet Forensics, we wanted to take a moment to reflect on everything we’ve been fortunate enough to accomplish. We sat down with our CEO, Adam Belsher to talk...
View ArticleA Deeper Look at Decryption: Q&A with Passware CEO and Founder Dmitry Sumin
Recently, Magnet Forensics and Passware partnered to offer full disk decryption in Magnet AXIOM. AXIOM now includes seamless integration with Passware decryption technology, which supports full disk...
View ArticleBeing Forensically Curious: The Process of Scripting
Our in-depth three-step forensic research methodology series, which started with “The Process of Discovery,” led to “The Process of Testing” and “The Process of Finding and Parsing,” concludes today...
View ArticleMagnet Forensics in 2017 – A Look Back by the Numbers
As 2018 rolls in, it’s a great opportunity to look back and see how Magnet Forensics grew in 2017 (for our CEO Adam Belsher’s take, read: Looking Back on 2017 with Adam Belsher, CEO of Magnet...
View ArticleHow the Onset of Security Apps is Impacting Investigations
Date and time: Tuesday, January 30, 2017 – 1:00PM Eastern Standard Time (New York, GMT-05:00) Duration: 1 hour Hosted by Jessica Hyde at Magnet Forensics With data breaches, identity theft, and social...
View ArticleJob Hunting in the DFIR Field
For those who don’t know, in addition to my work at Magnet Forensics, I teach Mobile Device Forensics at George Mason University. In addition to teaching the skills necessary to acquire and parse data...
View ArticleRevisit the Top 5 Magnet Forensics Webinars of 2017
We’re gearing up for our first webinar of 2018, “How the Onset of Security Apps is Impacting Investigations” on January 30. Jessica Hyde, our Director of Forensics, will look into vault and security...
View ArticleMagnet AXIOM 1.2.3 Improves Smartphone Acquisition
Customers can now get the latest version of Magnet AXIOM over at the Customer Portal! Magnet AXIOM 1.2.3 improves smartphone acquisition, provides innovative new time filtering capabilities,...
View ArticlePay Once, Train Continuously with the Magnet Training Annual Pass
We’re excited to announce a new offer in the Magnet Forensics Training program: The Magnet Training Annual Pass (TAP). It’s a one-time purchase that will allow you to take any number of training...
View ArticleWhite Paper: 4 Steps to Forensic Windows Password Cracking
Your Guide to a Repeatable Process for Determining and Retrieving User Passwords Download the white paper today! In late 2016, Microsoft introduced a large anniversary update for Windows 10, which...
View ArticleAnnouncing the Latest Magnet Forensics Community Award Winner: Austin Berrier
Whether it’s through their work on a case, their unrelenting commitment to the pursuit of justice, or their contribution to digital forensics as a whole, the Magnet Forensics Community Award is our way...
View ArticleExtracting Gold: Creating Wordlists from AXIOM Cases to Crack Passwords
Happy New Year everyone! Wishing you all a great 2018 full of successful investigations, RAID arrays that never fail, and passwords that are easy to crack. 😊 Cracking passwords is an unfortunate...
View ArticleNew Case Study Shows How Magnet AXIOM Helps Incident Responders Understand...
The June 2017 Trustwave Global Security report indicated that although the time to detect intrusion had improved—from 80.5 days in 2015 to just 49 days in 2016—the time from detection to containment...
View ArticleHow to Ingest Images from Various Tools and Acquisition Methods
Credible. Verifiable. Repeatable. Our Founder and CTO, Jad Saliba, and Jamie McQuaid, our Forensics Consultant, have made it clear how fundamental these elements are to an investigation. They both...
View ArticleLoading Cellebrite Images into Magnet AXIOM
Cellebrite images are quite popular, as the tool supports many different devices and extraction types. Because of this, you may get several different image types depending on the device and the type of...
View ArticleLoading Oxygen Images into AXIOM
As a continuation of our blog series around using multiple tools to be successful in your forensic investigations, this post is going to look at loading images from Oxygen into AXIOM. You can read the...
View ArticleLoading XRY Images into Magnet AXIOM
As a continuation of our series around analyzing mobile images in multiple tools, this blog is going to focus around using images created by MSAB XRY. For more information around the multi-tool...
View ArticleRecorded Webinar: How the Onset of Security Apps is Impacting Investigations
With data breaches, identity theft, and social sharing of personal information and content, awareness of personal privacy and security on mobile devices is growing. The onset of security apps for...
View ArticleNominate Magnet Forensics in this Year’s Forensic 4:cast Awards!
The nominations are open for the Forensic 4:cast Awards, and we’re hoping that you will nominate us in the major categories for the awards. We’d love to be able to get your support in these three...
View ArticleForensics in the Cloud: How to Conduct an Office 365 Investigation
Date and time: Wednesday, February 28 – 9:00AM Eastern Standard Time (New York, GMT-05:00) Duration: 1 hour As enterprises of all sizes continue to shift more and more data into cloud-based content...
View Article