IEF: Now Recovering Business Applications & OS Artifacts
Get More Digital Evidence with One Search This is the first blog post in a series of five about recovering Business Applications & OS Artifacts for your digital forensics investigations. With the...
View ArticleHow to Analyze USB Device History in Windows
This is the second blog post in a series of five about recovering Business Applications & OS Artifacts for your digital forensics investigations. Whether you’re a corporate examiner working an...
View ArticleForensic Analysis of LNK files
This is the third blog post in a series of five about recovering Business Applications & OS Artifacts for your digital forensics investigations. What are LNK Files? LNK files are a relatively...
View ArticleForensic Analysis of Prefetch files in Windows
This is the fourth blog post in a series of five about recovering Business Applications & OS Artifacts for your digital forensics investigations. What are Prefetch Files? Prefetch files are great...
View ArticleForensic Analysis of Windows Shellbags
This is the fifth and final blog post in a series about recovering Business Applications & OS Artifacts for your digital forensics investigations. What are Shellbags? While shellbags have been...
View ArticleCriminal Investigation of a DDos Attack
Learn how digital evidence played a vital role in a real-life Distributed Denial of Service attack. Darren Sabourin, Principal at Resolute InfoSec Inc, and Jad Saliba explain how Internet evidence was...
View ArticleThe New World of Mobile Investigations: Finding Important Evidence in...
This is the first blog post in a series of five about recovering third-party mobile chat applications for your digital forensics investigations. Over the last few years, we have seen a massive shift in...
View ArticleRecovering Kik Messenger Forensic Artifacts
This is the second blog post in a series of five about recovering third-party mobile chat applications for your digital forensics investigations. With over 150 million users worldwide, Kik Messenger...
View ArticleRecovering WhatsApp Forensic Artifacts
This is the third blog post in a series of five about recovering third-party mobile chat applications for your digital forensics investigations. Another popular mobile chat application is WhatsApp....
View ArticleRecovering BlackBerry Messenger Forensic Artifacts
This is the fourth blog post in a series of five about recovering third-party mobile chat applications for your digital forensics investigations. BlackBerry Messenger (BBM) was the original mobile...
View ArticleUsing Dynamic App Finder to Recover More Mobile Artifacts
This is the final blog post in a series of five about recovering third-party mobile chat applications for your digital forensics investigations. Data recovered from mobile chat apps is critical to many...
View ArticleImproving Your Mobile Forensics Workflow
This is the first blog post in a series of three about using IEF and Cellebrite to get more mobile evidence for your digital forensics investigations. Finding and analyzing evidence found on mobile...
View ArticleHow To Use IEF and Cellebrite to Find More Evidence On Android Devices
This is the second blog post in a series of three about using IEF and Cellebrite to get more mobile evidence for your digital forensics investigations. In my first blog post in this series, I discussed...
View ArticleHow To Use IEF and Cellebrite to Find More Evidence On iOS Devices
This is the third blog post in a series of three about using IEF and Cellebrite to get more mobile evidence for your digital forensics investigations. In my previous blog post in this series, I...
View ArticleSpeeding Up the Investigation of Employee Policy Violations
If you’re a forensics professional working in a corporate environment, investigating employee policy violations like time theft or inappropriate use of the Internet tend to be a part of your everyday...
View ArticleInvestigating Mobile Dating Applications in the Tinder Age
This is the second blog post in a series of six about the new features included in IEF v6.5 Investigations involving mobile devices have greatly increased over the past few years. In a recent blog...
View ArticleRecovering Live System Artifacts with IEF
This is the third blog post in a series of six about the new features included in IEF v6.5 The collection of volatile data has become an essential component of a forensic examiner’s processes. While...
View ArticleImproved Analysis Features in IEF v6.5
This is the fourth blog post in a series of six about the new features included in IEF v6.5 With the release of IEF v6.5, we’ve added a number of key features to help you analyze evidence more...
View ArticleAdding Tags & Comments to Bookmarks in IEF Report Viewer
This is the fifth blog post in a series of six about the new features included in IEF v6.5 In the fouth blog post in this series, I highlighted all of the new analysis features included in IEF v6.5....
View ArticleRecovering Evidence from F2FS File Systems with IEF
This is the sixth and final blog post in a about the new features included in IEF v6.5 In Internet Evidence Finder (IEF) v6.5 we are now offering support for the F2FS file system. The F2FS...
View Article