How MNPD solves cases faster with simultaneous extraction and connected review
Learn how the Metro Nashville Police Department added Magnet Graykey Fastrak and Magnet Review to their workflow to scale up their mobile extraction capabilities
Learn how the Metro Nashville Police Department added Magnet Graykey Fastrak and Magnet Review to their workflow to scale up their mobile extraction capabilities
With iOS and Android both having tap-to-pay payment functionality built in, it’s opened up a great opportunity for tracking where and how they’re using this feature.
Learn how Jamie Stokes uses Magnet Axiom Cyber to simplify data collection and analysis across dispersed endpoints in climate and energy solutions.
Efficiency, accuracy, and protecting data privacy is critical when performing mobile investigations. For forensic examiners, the ability to filter through massive datasets and extract only what is relevant to a case is invaluable.
You’re invited to join us for a lunch event that’s all about making the most of your time.
In digital forensics, Windows operating systems leave behind a wealth of forensic artifacts that can be invaluable in investigations. Among the key artifacts are ShimCache (Application Compatibility Cache) and AmCache (Application Activity Cache). These artifacts can provide valuable insights into program execution and file system interaction, often essential in piecing together an event timeline or … Continued
The latest release of Magnet Axiom Cyber introduces several improvements for examiners working on a variety of investigation types, from incident response to internal investigations. Magnet Axiom Cyber 8.6 includes an array of new features and improvements, such as: We’ve also updated and added to our artifact support (full details at the end of … Continued
PowerShell is a powerful tool within Windows systems, widely used for administrative tasks, automation, and scripting. Unfortunately, due to its powerful scripting capabilities and default presence on Windows machines, it has also become a popular tool for malicious actors. PowerShell can be used in advanced attacks, including fileless malware, lateral movement within a network, and … Continued
Across the board, we are seeing a wave of AI tools and capabilities coming into software applications and services. With the increase in accessibility of AI technology comes a potential dark side.
Time is always critical when dealing with criminal investigations, but did you know that some iOS forensics evidence will be lost entirely if it isn’t extracted within a certain window of opportunity? To help avoid any lost data during mobile forensic data extraction, we have outlined the best iOS evidence sources to capture before expiration, … Continued