How to Detect BLASTPASS Inside a WebP File
Once again, compression algorithms are showing us that they are ruling the internet.
Once again, compression algorithms are showing us that they are ruling the internet.
In this infographic, we’ll tell you how VERAKEY with AXIOM Cyber can help you quickly: Expose and investigate five types of IP infringement.
In part one of our Portable Case series, we looked at the features and benefits of Portable Case. We highlighted the power of real-time collaboration with multiple stakeholders and having all the feedback collected in one place.
With another year gone by, it’s time for another version of iOS to hit the market to coincide with the release of the iPhone 15 series and Apple’s first inclusion of the USB-C port to its iPhone line. While the USB-C port is old-hat for macOS devices and even several years old for iPadOS devices, bringing it to Apple’s mainstream mobile device will certainly bring some changes for forensic professionals. Let’s take a look at both the changes and features of iOS 17 as well as some forensic impacts going forward!
One of the most essential parts of the forensic process is reporting what you find on a system. Often, the forensic examiner may only know part of the case. Not having the complete picture as a single examiner makes collaborating on findings essential to the reporting process. Magnet Forensics has built Portable Case, a feature of Magnet AXIOM and Magnet Cyber, to help foster that collaboration, make it more integrated, and allow that needed collaboration.
Mobile devices have become indispensable tools in the modern workplace, enabling more than just checking email. Employees now browse the web, access sensitive company data, and conduct daily business operations on mobile devices. The vast amount of data stored on these devices makes them invaluable sources of evidence in digital forensics investigations.
Join Trey Amick, Director of Forensic Consultants, as he takes you on an exciting journey into the world of mobile device forensics, where you will discover the combined power of Magnet Verakey and Magnet Axiom Cyber. Together, these two tools empower users to access and extract full file system data from mobile devices, combine it with data from computer and cloud evidence, and then do a deep dive analysis.
Disclaimer: Please note that sections of this webinar have been intentionally blurred due to the nature of the content.
We’re excited to announce the release of Magnet AXIOM 7.5! This latest version of AXIOM adds several new features to help make your digital evidence analysis and reporting faster and easier.
We are thrilled to announce the release of Magnet AXIOM Cyber 7.5! In this release, we have introduced several new and updated features to help streamline your workflows and ensure you have all of the necessary data for your investigations, including:
We’re proud to be continuing our commitment to help promising officers get an opportunity to enter the field of—or advance in—digital forensics through the Magnet Forensics Scholarship Program.
Hybrid work is here to stay. With the increasing prevalence of remote work, mobile device policies are one area businesses must focus on. Businesses face a unique challenge because smartphones have become such critical tools for today’s working professionals.