S2:E11 // Following the money | Tracking mobile payment artifacts
With iOS and Android both having tap-to-pay payment functionality built in, it’s opened up a great opportunity for tracking where and how they’re using this feature.
With iOS and Android both having tap-to-pay payment functionality built in, it’s opened up a great opportunity for tracking where and how they’re using this feature.
In digital forensics, Windows operating systems leave behind a wealth of forensic artifacts that can be invaluable in investigations. Among the key artifacts are ShimCache (Application Compatibility Cache) and AmCache (Application Activity Cache). These artifacts can provide valuable insights into program execution and file system interaction, often essential in piecing together an event timeline or … Continued
Across almost every industry and application, advances in AI have been prompting changes that can have major effects on digital forensic examinations. While the rapid development and availability of AI can be leveraged for malicious purposes, it can also level the playing field to give examiners another tool to help them keep pace with AI-generated … Continued
When your word can make or break a case, your credibility is vital. Without a way to demonstrate your mastery of digital forensics, it can be harder to defend your findings and present them with full confidence. With Magnet Griffeye tools being a potentially vital part of any case involving media files—particularly CSAM—it’s even more … Continued
PowerShell is a powerful tool within Windows systems, widely used for administrative tasks, automation, and scripting. Unfortunately, due to its powerful scripting capabilities and default presence on Windows machines, it has also become a popular tool for malicious actors. PowerShell can be used in advanced attacks, including fileless malware, lateral movement within a network, and … Continued
Across the board, we are seeing a wave of AI tools and capabilities coming into software applications and services. With the increase in accessibility of AI technology comes a potential dark side.
Time is always critical when dealing with criminal investigations, but did you know that some iOS forensics evidence will be lost entirely if it isn’t extracted within a certain window of opportunity? To help avoid any lost data during mobile forensic data extraction, we have outlined the best iOS evidence sources to capture before expiration, … Continued
Digital forensics investigations have become a pressure cooker for forensics lab staff.
About a year ago, we announced our partnership with the National Center for Missing and Exploited Children (NCMEC)—the largest and most influential child protection organization in the U.S. Over the past year, we have collaborated to build a new information-sharing solution to support ICAC investigators across the U.S. Today, we’re excited to launch the NCMEC … Continued
This guide outlines how mobile data such as communications, geolocation data, financial transactions, and browsing history can be used in identifying drug dealers, building strong cases for prosecution, and ultimately saving lives by curbing the flow of narcotics into communities.