Offline iOS Tracking and Remote Wiping
Beginning with the iPhone 11, Apple introduced the U1 chip which utilizes a short-range, low energy, wireless communications protocol.
Beginning with the iPhone 11, Apple introduced the U1 chip which utilizes a short-range, low energy, wireless communications protocol.
Sometimes the tools that have been put in place to protect our data can actually become roadblocks in our forensic investigations.
Magnet AXIOM 6.5 is now available with new enhancements for Timeline and Media Explorer so you can uncover and manage your case evidence with ease.
The latest release of AXIOM Cyber – version 6.5 introduces several new and exciting features including: support for Dell Data Protection Encryption (DDPE), new remote volatile artifacts, added evidence sources and features for Email Explorer, and additional artifact details in Timeline view.
When you need to quickly narrow the scope of your investigation to analyze the data related to a crime or activity that occurred at a specific time, the Timeline explorer in Magnet AXIOM & Magnet AXIOM Cyber offers you an intuitive interface that surfaces time relevant evidence in a visual manner.
Investigations that center around media review and analysis often require additional examination time as lab personnel have to examine images and video found on devices.
In this series, we walk through how to ingest images from a variety of third party sources into Magnet AXIOM.
By resolving only the symptoms of a security incident, instead of the actual core issue, organizations can open themselves up to similar attacks in the future.
Here are a few mobile device forensics dos and don’ts that can help you and your agency ensure you are following best practices.
With Apple’s release of the AirTag and their market share giving them a huge network of devices for the FindMy environment, more and more devices need to be quickly located in cases.