Magnet Encrypted Disk Detector
Empower frontline officers to collect and report on fleeting digital evidence from consenting victims and witnesses.
Empower frontline officers to collect and report on fleeting digital evidence from consenting victims and witnesses.
Recently, we released a new free tool that allows investigators to acquire the memory of a live PC. Customers using our IEF Triage module will already be familiar with this tool, as it’s used to acquire evidence from live systems. In realizing that others could benefit from our RAM capture tool, we decided to release … Continued
By: Jad Saliba, Founder & CTO of Magnet Forensics It’s not an issue many like to talk about, or perhaps even know about. But child sex slavery is one of the fastest growing criminal enterprises in the world. A perverse industry that preys on the poor, especially in economically disadvantaged countries, this kind of exploitation … Continued
This is the seventh and final blog post in a series about the new features included in IEF v6.5 http://www.youtube.com/watch?v=BYB1Fdzq3BY&feature=youtu.be Visual evidence often tells the most compelling story, which is why we have made some improvements to our picture and video analysis capabilities with the release of IEF v6.5. New features will help you review … Continued
Learn how digital evidence played a vital role in a real-life Distributed Denial of Service attack. Darren Sabourin, former RCMP Officer, and Jad Saliba explain how Internet evidence was used to: Determine a user’s actions Show clear intent Obtain a criminal conviction Designed for digital forensics professionals who investigate network-based attacks, this webinar demonstrates techniques … Continued
This is the fifth and final blog post in a series about recovering Business Applications & OS Artifacts for your digital forensics investigations. What are Shellbags? While shellbags have been available since Windows XP, they have only recently become a popular artifact as examiners are beginning to realize their potential value to an investigation. Shellbags … Continued
In the first half of this IP forensics webinar, Heather Mahalik from SANS Institute offers tactical considerations for examining smartphone, cloud and computer artifacts in the event of intellectual property theft. She explores the challenges of investigating an IP theft case with the emergence of BYOD and cloud storage providers in the enterprise space. In … Continued
Download the white paper today! There are a variety of techniques used by suspects to erase and/or hide the things they do online. In this white paper, we will explore 3 different methods a person might use to conceal their online activity, before, during and after. Uncover “Hidden” Evidence Using Computer Forensics Tools We will … Continued
As a leading platform for voice and chat communications, Skype is often used as a platform for harassment or bullying incidents due to the perception that an individual’s actions are anonymous while on the Internet. Skype forensics analysis can yield valuable digital evidence for forensic investigators. In this white paper we’ll offer insight into where … Continued
In this webinar, Jad Saliba, Founder and CTO of Magnet Forensics, will take you through a fictional case study involving child luring that leads to murder. You will discover how digital forensics, geolocation artifacts and timeline analysis in particular, can be critical in solving cases like these and where you can look to find the … Continued