Quantcast
Channel: Magnet Forensics
Browsing all 1190 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

What to Look For in a Write Blocker

One of the essential tools you’ll need when recovering video evidence from surveillance DVRs is a write blocker. Write blockers are devices that allow you to read the information on the drive without...

View Article


What’s New in Magnet AXIOM Cyber 5.10

We’re happy to announce the availability of Magnet AXIOM Cyber 5.10!   You can upgrade to the latest version within AXIOM Cyber or over at the Customer Portal. If you haven’t tried AXIOM Cyber yet,...

View Article


Magnet AXIOM 5.10: Bringing Even More Support for iOS 15

We’re proud to announce the availability of Magnet AXIOM 5.10!  You can upgrade to the latest version within AXIOM or over at the Customer Portal.    With Magnet AXIOM 5.10, we’re offering expanded...

View Article

Surveillance DVRs: Orderly Shutdown or Pulling the Plug?

One ongoing debate within the traditional computer forensics community has been how to respond to a running computer in the field. When you arrive on scene to a running computer, do you go straight to...

View Article

Image may be NSFW.
Clik here to view.

Meet the Magnet Forensics’ Training Team: Nick Bria

Introducing our newest member of the Training Team, Nick Bria. Learn more about Nick’s varied and interesting background and what he’s hoping to bring to his role at Magnet Forensics. Let’s get to...

View Article


Image may be NSFW.
Clik here to view.

DFIR in Zero-Trust Environments: Utilizing AXIOM Cyber for Remote Collection...

Organizations continue to embrace the zero-trust model to address security challenges brought about by distributed work environments. This means that every instance of communication must be validated...

View Article

Image may be NSFW.
Clik here to view.

Analysis of Hikvision Date/Time

Hikvision-based systems store date/time metadata a little differently than other DVR filesystems, and when it comes to adding support for new DVRs into DVR Examiner, or recovering video manually for a...

View Article

Image may be NSFW.
Clik here to view.

Data Recovery with DVR Examiner: Accessible, Inaccessible, and VERY Inaccessible

How does DVR Examiner work? Data recovery with DVR Examiner works by reverse engineering the many different DVR filesystems to locate and extract video footage. Most DVRs use a proprietary filesystem....

View Article


Image may be NSFW.
Clik here to view.

Magnet Summit 2022 Capture the Flag Contests

Hi! This is Jessica Hyde and I am so excited to announce the plans for the Capture The Flag competitions at Magnet Summit 2022. As you may know, this year there are two components to the Magnet...

View Article


Image may be NSFW.
Clik here to view.

Finding the Best Data Recovery Workflow in DVR Examiner 3

Data recovery is a key function of DVR Examiner for all our users, despite varying case load and case nature. An efficient workflow, and the ability for users to customize the workflow they follow...

View Article

Image may be NSFW.
Clik here to view.

Advanced Admin-Level Scan for macOS: Magnet OUTRIDER

Triaging Mac workstations has never been easier with Magnet OUTRIDER for Mac.  From importing NCMEC data to using keywords and searching browser history, OUTRIDER can uncover actionable evidence...

View Article

Enhanced Support for macOS Triage: Magnet OUTRIDER 3.1

We’re proud to announce the availability of Magnet OUTRIDER 3.1! With OUTRIDER 3.1, we are introducing even more triage support for macOS devices and external drives, including support for Chromium,...

View Article

Image may be NSFW.
Clik here to view.

Recovering Deleted DVR Video with DVR Examiner

Recovering deleted DVR video is possible, despite the fact that many DVR users believe that by deleting video through the DVR interface they are rendering video unrecoverable. In most instances, when...

View Article


Image may be NSFW.
Clik here to view.

What is a Filesystem?

A filesystem is a term that Magnet Forensics uses to refer to a specific family of DVRs. Families are often made up of several different lineages all combined, right? We see DVRs the same way. We deal...

View Article

Image may be NSFW.
Clik here to view.

Write Blocker vs. Imaging Device

Choosing between write blocker vs. imaging device isn’t easy. Imagine you’ve just been handed a hard drive from your boss who gives instructions to find all the vital information on it. You are...

View Article


How To Get Started with DVR Examiner

DVR Examiner allows you to recover video and metadata from CCTV and surveillance DVRs including those that are password protected or damaged. Let’s walk through the best practices to get started with...

View Article

Image may be NSFW.
Clik here to view.

What is DVR Profiler?

If your DVR is not supported through DVR Examiner yet, you will be prompted to create a DVR Profiler report. These reports help us identify new DVRs that we haven’t encountered yet and are the first...

View Article


Image may be NSFW.
Clik here to view.

3 Reasons to Automate Enterprise DFIR Workflows

The need to automate enterprise DFIR workflows is greater than ever. Private sector and enterprise organizations are facing an onslaught of cyberattacks that shows no sign of stopping. According to a...

View Article

Leveraging Magnet Forensics Software for Human Trafficking Investigations

Author John Pizzuro is a 25-year veteran in law enforcement and has served in several roles, including investigating organized crime and being part of the New Jersey Internet Crimes Against Children...

View Article

Image may be NSFW.
Clik here to view.

How EDR Complements DFIR

Chances are if you have EDR (Endpoint Detection and Response) tools, your cybersecurity posture is mature enough that you also have DFIR (Digital Forensics and Incident Response) tooling as well. But...

View Article
Browsing all 1190 articles
Browse latest View live