10 Tips to Investigate Insider Fraud With Digital Forensics
What to do when you suspect insider fraud: 10 tips for investigating with digital forensics.
What to do when you suspect insider fraud: 10 tips for investigating with digital forensics.
Cloud computing has become a key enabling technology for many organizations today, helping them to transform their processes by providing resource flexibility, improved security, and reduced complexity and costs.
We’re excited to announce that the latest version of Magnet AXIOM Cyber is now available!
Magnet REVIEW helps you empower your investigators and other stakeholders to easily and securely collaborate on digital evidence review from any of your sources, and from anywhere in the world.
Our latest version of REVIEW makes it even easier for you to bring your investigators and their evidence together, with a revamped user interface to help them to quickly find the evidence that matters and a new SaaS-based option designed to simplify deployment and management.
Join Magnet Forensics’ Nicole Davis and Jonathan Evans for a walkthrough of the new experiences in REVIEW 5.3, including cross evidence views, updated evidence previews, and an early access free trial of our upcoming SaaS-based cloud deployment model.
iOS and Android devices are usually a plethora of media data, but what types of media data await an examiner? What is the difference between a HEIC and a JPEG, a PNG and a KTX, ProRes and ProRaw, or even a Live Photo versus a Motion Photo? Which types of media are going to be natively viewable, and which ones will require a special viewer?
Join Chris Vance in this next episode of Mobile Unpacked, where he will explore the different types of media files that are present on both Android and iOS devices including their proprietary formats and what each type of media file can tell us contextually about the data that awaits us.
Whenever an app ends up on a modern smartphone, it has to first ask for permission from the user for its functions. These permissions can be standard or considered ‘sensitive.’ Join us for this next episode of Mobile Unpacked with Chris Vance to learn how to use this information to track insights about the 3rd party apps installed on a device, what they have done or not done, and whether or not their behavior is malicious.
Microsoft 365 presents a rich and diverse artifact landscape for digital forensic investigators and incident responders to take advantage of. In this session we will authenticate as an M365 user to explore the options available and acquire some user data before taking a look at the results, all in AXIOM Cyber.
We’re excited to announce that we’re coming back to Music City for Magnet User Summit 2024!
Mobile device artifacts are digital breadcrumbs: forensically valuable data created by a mobile device that help investigators better understand a case.
Media artifacts on a device – both captured with the device’s on-board cameras and transmitted to the device through various methods – can be another area of interest during an investigation.