Using Internet Evidence Finder (IEF) to detect malware activity
Many people have Internet Evidence Finder (IEF) in their toolbox to help identify specific Internet-related artifacts/behavior of a particular user for investigative purposes. IEF can also be used to...
View ArticleCDMN Announces 2013 Moonshot Award Winners at Canada 3.0
The Canadian Digital Media Network (CDMN) announced the winners of the inaugural CDMN Moonshot Awards. Magnet Forensics was honoured with the Dynamic Company of the Year award at CDMN’s Canada 3.0...
View ArticleInternational Association of Chiefs of Police Conference (IACP)
October 19 – 23, 2013 Philadelphia, PA Featuring renowned keynote speakers, forums and technical workshops, and the largest exhibit hall of products and services in the law enforcement community, the...
View ArticleHTCIA International Conference
September 8 – 11, 2013 Summerlin, NV The HTCIA conference is THE premier event for those in law enforcement or private industry who investigate high technology crime. Re-connect with your colleagues,...
View ArticleCrimes Against Children Conference (CACC)
August 12 – 15, 2013 Dallas, Texas Providing Professionals the Instruction, Information and Strategies They Need to Protect Child Victims and Prosecute their Offenders. A nationally and...
View ArticleBlack Hat USA 2013
July 30 – August 1, 2013Las Vegas, Nevada The Black Hat Briefings have become the biggest and the most important security conference series in the world by sticking to our core value: serving the...
View ArticleMagnet Forensics Internet Evidence Finder™ Now Integrated with EnCase®
June 6th, 2013 – Magnet Forensics, the global leader in the development of forensic software for the recovery of Internet artifacts, recently collaborated with Guidance Software to develop an...
View ArticleUsing Internet Evidence Finder (IEF) with Encrypted Drives
Full disk encryption (FDE) is becoming more and more common, especially in the corporate environment. Many IEF users have asked how they can leverage the power and simplicity of IEF with encrypted...
View Article4:cast – Episode 43 – Where No Forensicator Has Gone Before
In this episode our Founder & CTO Jad Saliba discusses the newly announced mobile phone features coming soon to Internet Evidence Finder™ (IEF). This episode is available as both a video or...
View ArticleHow important are Facebook Artifacts?
In March 2013, Facebook reportedly had just over 1 billion users worldwide. Founded in February 2004, it can be considered one of the grandfathers of social networking. Nearly ten years later and even...
View ArticleMagnet Forensics Releases Internet Evidence Finder Standard (IEF Standard) v6.1
IEF Standard v6.1 is now available for download. New Features In This Release Include: New Artifacts Bitcoin, Instagram, IE cookie.txt files, IE Type URLs Carving for Internet Explorer 10 Integrated...
View ArticleMagnet Forensics Adds Support for Mobile Devices with the Introduction of...
Building on our commitment to assist thousands of customers, in the world’s top law enforcement, military, government and corporate organizations, recover data from a broad range of Internet-related...
View Article“Oh no, the suspect ran CCleaner to get rid of the evidence!”
I recently received a few questions about the effects of running Internet history sanitation tools such as CCleaner, when examining a computer looking for internet related artifacts. CCleaner is a...
View ArticleInternet Evidence Finder (IEF) v6.1: Understanding the New “Editions” and...
With the launch of IEF v6.1 we have added a host of new features that we’re really excited about. We listened to feedback from our customers and delivered a great new set of mobile device forensic...
View ArticlePart 2: Oh no, the suspect wiped free space to get rid of the digital evidence
This article is a follow-up from one I did last week on when a person may use a sanitation tool such as CCleaner to “clean” their Internet history and other activity. In that article, I discussed how...
View ArticleAttracting the Worst Kind of Predator – Magnet Forensics is on the cyber-hunt...
Owners and entrepreneurs understand that rare energy experience when passion produces profit, stimulates growth and attracts talent. It takes a particular kind of entrepreneur, the kind movies are...
View ArticleIEF Wins Computer Forensic Software Tool of the Year
Sometimes when I reflect back to what IEF did back in its very early stages (and what it looked like! Long-time users will remember how ugly it was at the beginning, and I believe Matt Shannon of...
View ArticleHow Private is Internet Explorer’s InPrivate Browsing?…First define “private”
As a follow-up to my recent posts about a suspect using CCleaner in an attempt to hide their Internet activity, I received several emails asking about Internet Evidence Finder’s ability to recover...
View ArticleInvestigating iOS Phone Images, File Dumps & Backups
As of January 2013, Apple announced it had sold over 500 million iOS devices. While iOS seems to be the leading operating system for tablets worldwide, Android continues to be the leading operating...
View ArticleConvert X-Ways TSV data into TLN data for IEF Timeline
Today I’m pleased to announce a new free tool and a guest blog post from James Morris of the Queensland Police Service in Australia. James came to me a couple weeks ago with a request to help him get...
View Article