Now Open—Register for the Magnet User Summit Series//2018!
The Magnet User Summit Series is back, and it’s coming to more cities this year! We’re bringing news, hands-on learning, and our observations on industry issues to Las Vegas, US; London, England;...
View ArticleMagnet Forensics’ 2017 White Papers: A Retrospective
What do Android analysis, forensic machine learning, and going to court have in common? They were all topics of Magnet Forensics’ white papers last year. Whether to share our experts’ research and...
View ArticleDevice Agnostic Mobile Acquisition – Who Needs Model Numbers?
There is a current misconception by many in the mobile forensics field that every acquisition method conducted on a mobile phone is specific to that model. Quite often, I will get requests from...
View ArticleUsing AXIOM Cloud to Acquire and Process Yahoo Email
Magnet AXIOM supports many different services and platforms in its cloud product from Google, Microsoft, Facebook, Twitter, Dropbox, and many more. We also include a generic POP/IMAP connector to allow...
View ArticleMagnet AXIOM 1.2.4 Brings New Capabilities to Bypass Android Passwords
Magnet AXIOM 1.2.4 is now available for customers to download in the Customer Portal. With the latest release of AXIOM, we’re bringing new capabilities to bypass Android passwords, full Cloud token...
View ArticleMagnet AXIOM Advanced Computer Forensics (AX250) Now Open!
We’re proud to introduce a new course for people who are looking to expand the capabilities of their computer forensics investigations: Magnet AXIOM Advanced Computer Forensics (AX250). This is an...
View ArticleRecorded Webinar: Forensics in the Cloud: How to Conduct an Office 365...
As enterprises of all sizes continue to shift more and more data into cloud-based content collaboration platforms, it’s more important than ever to learn how to recover cloud-based data and perform...
View ArticleForensics in the Cloud: How to Conduct an Office 365 Investigation
Date and time: Tuesday, March 13 – 1:00PM Eastern Standard Time (New York, GMT-05:00) Duration: 1 hour As enterprises of all sizes continue to shift more and more data into cloud-based content...
View ArticleExtracting Data from a Samsung Device Using Advanced MTP
Samsung devices are one of the most popular device types on the most popular mobile operating system, Android. In the case of a recent examination, a Samsung was giving me a lot of trouble. It was a...
View ArticleMobile Trends, Tools and Methods
Mobile forensic acquisition and analysis continue to challenge even the most experienced professionals in the industry. Encryption, various forms of device locks, and ever-new releases of devices,...
View ArticleWhat “the Last Version of Windows” Means for Digital Forensics
In January, we released the AXIOM Wordlist Generator free tool and described in our white paper the changes to the Microsoft® Windows® 10 login workflow that affected password cracking practices. The...
View ArticleThe Magnet User Summit Europe Series//2018: Mobile Forensics with Magnet AXIOM
Coming to London, Paris, and Düsseldorf this April: the Magnet User Summit — your opportunity to attend in-depth lectures and a hands-on lab for the recovery, analysis, and reporting of digital...
View ArticleFile System Forensics: No Longer the Gold Standard? (Part 1)
Digital forensics has relied on the file system for as long as hard drives have existed. The structures associated with File Allocation Tables (FAT), the New Technology File System (NTFS), Extended...
View ArticleDevice Agnostic Mobile Acquisition – Who Needs Model Numbers?
There is a current misconception by many in the mobile forensics field that every acquisition method conducted on a mobile phone is specific to that model. Quite often, I will get requests from...
View ArticleThe Shift from File System Forensics to Artifacts-Oriented Forensics (Part 2)
Our previous blog covered the reasons why we think file system forensics’ marginal returns are rapidly diminishing, and why we think the process needs to be balanced with a more efficient,...
View ArticleMagnet AXIOM 1.2.6 Brings Cloud Improvements and Support for Google Hangouts
The latest version of Magnet AXIOM is ready for customers to download either at the Customer Portal or when you open AXIOM. Magnet AXIOM 1.2.6 brings improvements to Cloud acquisition — including...
View ArticleRecorded Webinar: Mobile Trends, Tools, and Methods
Mobile forensic acquisition and analysis continue to challenge even the most experienced professionals in the industry. Encryption, various forms of device locks, and ever-new releases of devices,...
View ArticleThe Benefits of the Artifacts-Oriented Approach (Part 3)
Our previous two blogs covered the reasons why we think file system forensics’ marginal returns are rapidly diminishing, and the changes in consumer electronics that continue to drive the need for a...
View ArticleMobile App Parsing – All About that Data
Date and time: Thursday, April 12 – 9:00AM Eastern Standard Time (New York, GMT-05:00) Duration: 1 hour Every day new mobile applications hit the App Store and Google Play. Many of these new apps...
View ArticleTelling the Story of Digital Evidence
In digital forensics, demonstrating attribution—using operating system artifacts to prove that the suspect had knowledge of the document or image files found on a device—is one of the key elements of...
View Article