Creating an Investigative Timeline with IEF and EnCase Forensic
Guidance Software and Magnet Forensics have been collaborating to help investigators combine two great tools – Internet Evidence Finder (IEF) and EnCase Forensic – to maximize the time spent on cases...
View ArticleInvestigating Child Exploitation Cases – Webinar
When a child’s safety is on the line, how do you get to key internet forensics evidence quickly enough to begin building your case? Designed for digital forensics investigators who may work on child...
View ArticleTechno Security & Forensics Investigations Conference
June 1-4, 2014 Myrtle Beach, SC The Sixteenth Annual International Techno Security Conference will be held June 1-4 in sunny Myrtle Beach at the Myrtle Beach Marriott Resort. Visit us at Booth 703/704...
View ArticleCEIC
May 19-22, 2014 Las Vegas, NV It’s no exaggeration to say that CEIC is the biggest digital-investigations conference of its kind and the only one to offer hands-on lab sessions and training for...
View ArticleInternet Evidence Finder Timeline at Forensics Europe
Last week we made the trip across the pond to Olympia, UK for the Forensics Europe Expo. This was a new conference for the Magnet Forensics team, and I was excited to present on how Geolocation...
View ArticleCrimes Against Children Conference (CACC)
August 11-14, 2014 Dallas, TX Providing Professionals the Instruction, Information and Strategies They Need to Protect Child Victims and Prosecute their Offenders. A nationally and...
View ArticleGMU (RCFG – Computer Crime & Forensics Training)
August 4-8, 2014 Fairfax, VA The purpose of GMU 2014 is to provide training to all levels of the cyber-enforcement community from security specialists to Law Enforcement personnel. Training attendance...
View ArticleComing Soon to IEF: Recover Documents, Corporate Email, IM and OS Artifacts
With the release of our next version of Internet Evidence Finder (IEF), we will be introducing a new business application and operating system artifacts module that enables the recovery of a host of...
View ArticleBlackBerry Messenger (BBM) Forensics
BlackBerry Messenger (BBM) started as the original mobile messaging application geared towards business users and productive consumers. Originally available only on BlackBerry devices, BBM has since...
View ArticleInvestigating Child Exploitation Cases – Webinar
When a child’s safety is on the line, how do you get to key internet forensics evidence quickly enough to begin building your case? Designed for digital forensics investigators who may work on child...
View ArticleCEO Adam Belsher interviews with Forensic Focus
Scar de Courcier of Forensic Focus caught up with our CEO, Adam Belsher, at the Forensics Europe Expo in April. Adam addresses questions about the challenges that Digital Forensic Investigators face...
View ArticleMagnet Forensics poised to tackle ‘billion-dollar market’
Anthony Reinhart, Communitech’s writing guru, interviewed our CEO Adam Belsher for a deep dive on what has made Magnet Forensics so successful in just two years. With an amazing and dedicated team, not...
View ArticleUnderstanding the New IEF Editions, Modules and Pricing
After listening to customer feedback over the last few years, the Magnet Forensics team has worked diligently to add a host of new features to Internet Evidence Finder (IEF) to help our customers...
View ArticleInvestigating Child Exploitation Cases: Webinar Q&A
On Wednesday, May 28th, Magnet Forensics CTO, Jad Saliba and Forensics Consultant, Jamie McQuaid hosted a webinar on investigating child exploitation cases. Attendees learned how to identify a suspect...
View ArticleIEF Wins Forensic 4cast Award
IEF Wins Forensic 4cast Award for Computer Forensic Software of the Year! After winning the Forensic 4cast award for Computer Forensic Software of the Year in 2013, Internet Evidence Finder (IEF) has...
View ArticleFinding and Analyzing Document Files with IEF
Digital forensics has evolved from the examination of computers, storage and documents to the analysis of data from the Internet, smartphones and networks. This evolution has greatly expanded the scope...
View ArticleFinding and Analyzing Email with IEF
Internet Evidence Finder (IEF) is well known for its ability to excel at recovering Internet artifacts from chat, social networking and browsers including webmail. New with IEF v6.4, we’ve expanded...
View ArticleInvestigating User Activity with Windows Artifacts in IEF
Sometimes when conducting forensic examinations, investigators can lose sight of the fact that they’re investigating the actions of a person, not a computer. Almost every event or action on a system...
View ArticleFinding and Analyzing Windows System Artifacts with IEF
New with the Business and OS artifacts module in Internet Evidence Finder (IEF) v6.4, we have added a number of valuable Windows operating system artifacts that will help investigators gain insight...
View ArticleMagnet Forensics Releases Internet Evidence Finder v6.4
With the release of Internet Evidence Finder v6.4, Magnet Forensics adds to its list of Internet and mobile-supported artifacts, and introduces a new Business Applications and OS Artifacts Module to...
View Article