Quantcast
Channel: Magnet Forensics
Browsing all 1190 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Magnet AXIOM 7.5 – Continuing to Improve Mobile Investigations With Magnet...

We’re excited to announce the release of Magnet AXIOM 7.5! This latest version of AXIOM adds several new features to help make your digital evidence analysis and reporting faster and easier. AXIOM’s...

View Article


Image may be NSFW.
Clik here to view.

Deep Dive on Portable Case Part 1

One of the most essential parts of the forensic process is reporting what you find on a system. Often, the forensic examiner may only know part of the case. Not having the complete picture as a single...

View Article


Image may be NSFW.
Clik here to view.

iOS 17 Forensics: Another Year, Another Byte of the Apple

With another year gone by, it’s time for another version of iOS to hit the market to coincide with the release of the iPhone 15 series and Apple’s first inclusion of the USB-C port to its iPhone line....

View Article

Image may be NSFW.
Clik here to view.

Deep Dive on Portable Case Part 2

In part one of our Portable Case series, we looked at the features and benefits of Portable Case. We highlighted the power of real-time collaboration with multiple stakeholders and having all the...

View Article

Image may be NSFW.
Clik here to view.

Updated Memory Analysis Capabilities in Magnet IGNITE

As preventative tools have gotten more adept at blocking traditional cyberattacks, bad actors have increasingly leveraged tactics that run only in memory, making them near invisible to most detection...

View Article


The Art of Detection: Digital Forensics and Intellectual Property Theft 

What Is Intellectual Property (IP)? Company-owned data, copyrighted work, trademarks, and patents are all forms of intellectual property. Intellectual property rights are designed to protect...

View Article

Small Bytes: Digital Forensics Exonerates Husband From Murder Charges

As technology evolves, law enforcement agencies must be equipped with the tools and expertise to use digital forensics in their investigations effectively. In cases where traditional forensic evidence...

View Article

Image may be NSFW.
Clik here to view.

How to Detect BLASTPASS Inside a WebP File

This is a post authored by Matt Suiche (Director of Detection Engineering). Introduction Once again, compression algorithms are showing us that they are ruling the internet. My initial encounter with...

View Article


Magnet AXIOM Cyber 7.6: New Remote Endpoint File Listing For Quick Insights

The latest version of Magnet AXIOM Cyber is now available! In this release, we focused on new features and improvements to make your investigations even faster and easier, no matter what type of case...

View Article


Image may be NSFW.
Clik here to view.

Three Ways to Use Remote Endpoint File Lists to Streamline Your Investigations

When you’re faced with a security incident or supporting an internal investigation, quickly obtaining Remote Endpoint File Lists (a full list of all the files and folders present on an endpoint or...

View Article

Image may be NSFW.
Clik here to view.

Magnet AXIOM 7.6: 3D Printed Weapon Classifier, Protobuf Enhancements, and More

We’re thrilled to announce the release of Magnet AXIOM 7.6! In this release, we have added several new and updated features to streamline your workflows and help make your digital evidence analysis...

View Article

Image may be NSFW.
Clik here to view.

Responding at Scale with Magnet RESPONSE

This is a post authored by Doug Metz, Security Forensics Consultant. What is Magnet RESPONSE? Magnet RESPONSE is a free tool that lets investigators and non-technical users easily collect and preserve...

View Article

Image may be NSFW.
Clik here to view.

How to Uncover Geolocation Artifacts for Mobile Device Investigations

Geolocation artifacts are forensically valuable data created by GPS or other location-based technologies on a device that determine an individual’s geographic location. This data can be useful in...

View Article


Announcing Magnet GRAYKEY Fastrak – Scale Up Your Mobile Data Collection

Mobile smartphones have become engrained in our daily lives, so when someone commits a crime, mobile data is almost always a critical source of evidence. Magnet GRAYKEY provides the ability to quickly...

View Article

Image may be NSFW.
Clik here to view.

How to Uncover Communication Artifacts for Mobile Device Investigations

Communication artifacts are digital breadcrumbs suspects leave behind in the form of emails, social media, native chat applications like the Messages app on iOS, or a third-party application like...

View Article


Image may be NSFW.
Clik here to view.

How to Uncover Web Browser Activity Artifacts for Mobile Device Investigations

Web browser activity artifacts are digital clues suspects create when they use web browsers on mobile devices. Browser history, cookies, cache, and file downloads are all web activity artifacts that...

View Article

The State of Enterprise DFIR: Share What You’re Seeing in Our Survey!

The State of Enterprise DFIR survey is now open until November 16, 2023. We want to know what you’re noticing in the field of DFIR!  That’s why we’re opening our survey for the fourth annual State of...

View Article


Image may be NSFW.
Clik here to view.

How to Uncover Application Artifacts for Mobile Device Investigations

Application artifacts are an important data source in mobile device investigations. Identifying what applications are installed on the device and have been in use can be another investigative goal....

View Article

Image may be NSFW.
Clik here to view.

How to Uncover Media Artifacts for Mobile Device Investigations

Media artifacts on a device – both captured with the device’s on-board cameras and transmitted to the device through various methods – can be another area of interest during an investigation. Media...

View Article

Image may be NSFW.
Clik here to view.

Mobile Device Artifacts: Exploring Geolocation, Communication, Application...

Mobile device artifacts have grown in importance as cell phones have become an integral part of everyday life (so much so that you can see many videos on social media where users are so engrossed in...

View Article
Browsing all 1190 articles
Browse latest View live