How to Detect BLASTPASS Inside a WebP File
Once again, compression algorithms are showing us that they are ruling the internet.
Once again, compression algorithms are showing us that they are ruling the internet.
In this infographic, we’ll tell you how VERAKEY with AXIOM Cyber can help you quickly: Expose and investigate five types of IP infringement.
One of the most essential parts of the forensic process is reporting what you find on a system. Often, the forensic examiner may only know part of the case. Not having the complete picture as a single examiner makes collaborating on findings essential to the reporting process. Magnet Forensics has built Portable Case, a feature of Magnet AXIOM and Magnet Cyber, to help foster that collaboration, make it more integrated, and allow that needed collaboration.
Mobile devices have become indispensable tools in the modern workplace, enabling more than just checking email. Employees now browse the web, access sensitive company data, and conduct daily business operations on mobile devices. The vast amount of data stored on these devices makes them invaluable sources of evidence in digital forensics investigations.
Join Trey Amick, Director of Forensic Consultants, as he takes you on an exciting journey into the world of mobile device forensics, where you will discover the combined power of Magnet Verakey and Magnet Axiom Cyber. Together, these two tools empower users to access and extract full file system data from mobile devices, combine it with data from computer and cloud evidence, and then do a deep dive analysis.
Disclaimer: Please note that sections of this webinar have been intentionally blurred due to the nature of the content.
We are thrilled to announce the release of Magnet AXIOM Cyber 7.5! In this release, we have introduced several new and updated features to help streamline your workflows and ensure you have all of the necessary data for your investigations, including:
We’re proud to be continuing our commitment to help promising officers get an opportunity to enter the field of—or advance in—digital forensics through the Magnet Forensics Scholarship Program.
With Magnet VERAKEY and Magnet ARTIFACT IQ, investigators can acquire, preserve, and analyze the contents of the full file system.
Hybrid work is here to stay. With the increasing prevalence of remote work, mobile device policies are one area businesses must focus on. Businesses face a unique challenge because smartphones have become such critical tools for today’s working professionals.
Responding to cyber security incidents often necessitates leveraging the experience of the broader team to ensure a quick and complete response. IGNITE now allows you to easily share and collaborate on cases within your organization, helping your team work together to reach a quick resolution.
With Samsung’s stance on device-based encryption, there are multiple additional factors in play for those devices versus other Android handsets. One such factor is the Samsung Secure Folder which is part of their Knox security platform. Join Matt Fullerton and Chris Vance for this Mobile Unpacked episode where they will explore what Secure Folder is, how you can access it, and what information lies within.