IEF Feature Focus – Rebuilding Webpages
One of the easy-to-use and valuable features of Internet Evidence Finder (IEF) is how the tool rebuilds web pages. IEF has the ability to reconstruct web pages from the browser history and cache as...
View ArticleWebmail Forensics Part II: Mobile Applications
Previously we discussed webmail artifacts and how they relate to traditional host-based forensic analysis and focused on how Internet Evidence Finder (IEF) analyzes the browser artifacts and provides...
View ArticleHash Analysis Demonstration in IEF v6.3 Video Tutorial
This video demonstrates how Internet Evidence Finder (IEF) v6.3 can now perform hash analysis for all the pictures in a case. Importing, exporting and categorization are all discussed and how it can...
View ArticleNew Mobile Chat Artifacts in IEF v6.3 Video Tutorial
This video demonstrates the new mobile chat artifacts supported in Internet Evidence Finder (IEF) Advanced v6.3. Support for AIM, BBM, LINE, Grindr, Growlr, Textplus, Touch, Viber, QQ Chat, and WeChat...
View ArticleAnalyzing the Kindle Fire with IEF v6.3 Video Tutorial
This video walks the user through a typical investigation involving Amazon’s Kindle Fire tablet, now supported in Internet Evidence Finder (IEF) Advanced v6.3. Additional artifacts including the Silk...
View ArticleUsing IEF v6.3 to Analyze Volume Shadow Copies Video Tutorial
New with version 6.3, Internet Evidence Finder (IEF) now supports native volume shadow copy mounting and analysis. In this video, we demonstrate what this means to your investigations and how to...
View ArticleUsing Hash Analysis to Identify and Categorize Pictures
Forensic investigators are well aware how common hashing algorithms such as MD5 and SHA-1 help them confirm that their forensic image is an exact copy of the original disk or volume. This assists the...
View ArticleTechno Security & Forensics Investigations Conference
June 1-4, 2014 Myrtle Beach, SC The Sixteenth Annual International Techno Security Conference will be held June 1-4 in sunny Myrtle Beach at the Myrtle Beach Marriott Resort. This conference promises...
View ArticleCEIC
May 19-22, 2014 Las Vegas, NV It’s no exaggeration to say that CEIC is the biggest digital-investigations conference of its kind and the only one to offer hands-on lab sessions and training for...
View ArticleForensics Europe Expo
April 29-30, 2014 Olympia, London Forensics Europe Expo is the premier dedicated international forum for the entire forensics sector and supply chain, bringing together over 160 conference delegates...
View ArticleIACIS
April 28-May 9, 2014 Orlando, FL IACIS is a non-profit, volunteer organization wholly dedicated to training, certifying and providing membership services to computer forensic professionals around the...
View ArticleUSA Cyber Crime Conference
April 28-30, 2014 Leesburg, VA The U.S. Cyber Crime Conference is continuing the 12 year tradition of success established by the former DoD Cyber Crime Conference. To keep up with the global cyber...
View ArticleUS Defense Cyber Crime Institute (DCCI) validates IEF v6.2
We are pleased to announce that Internet Evidence Finder (IEF) v6.2 has been validated by the United States Defense Cyber Crime Institute (DCCI). DCCI is the research, development and evaluation arm...
View ArticleIEF Feature Focus: Exporting and Reporting
While most forensic examiners spend the majority of their time analyzing the evidence from their case, one of the most important steps in the investigative process – reporting – is often rushed....
View ArticleInternet Evidence Finder nominated for TWO Forensic 4cast Awards in 2014!
After winning the Forensic 4cast award for Computer Forensic Software of the Year in 2013, we are excited to announce that Internet Evidence Finder (IEF) has once again been nominated in this category...
View ArticleMagnet Forensics Named to Branham300 List as One of Canada’s Top Technology...
Waterloo, ON., April 22, 2014—Branham300 today ranked Magnet Forensics Inc. to its 21st annual list of the Top 250 Canadian ICT Companies, as ranked by revenue. The Branham300 list illustrates the...
View ArticleWorking more efficiently with Internet Evidence Finder and EnCase Forensic
Caseloads for examiners are growing far beyond anything manageable with manual tools and traditional forensic processes. Investigators must find a way to maximize their time and energy by accelerating...
View Article3 Ways to Make IEF and EnCase Work Better Together
We partnered with Guidance Software to demonstrate how combining Internet Evidence Finder (IEF) and EnCase Forensic can help investigators yield more thorough results in their investigations. If you...
View ArticleUncover the Truth About IEF in Less Than Two Minutes
In this new video, we show you how Internet Evidence Finder (IEF) digs deeper and searches wider to uncover more evidence than ever before – faster. Learn how IEF helps digital forensic investigators...
View ArticleIP Theft: Collecting Artifact Evidence from the Cloud and Mobile
SANS and Magnet Forensics teamed up recently to collaborate on a case study of Intellectual Property (IP) theft. This webinar will walk you through an IP theft case study, investigating many of the...
View Article