Improved Analysis Features in IEF v6.5

This is the fourth blog post in a series of seven about the new features included in IEF v6.5 With the release of IEF v6.5, we’ve added a number of key features to help you...

Read more >

Recovering Live System Artifacts with IEF

This is the third blog post in a series of seven about the new features included in IEF v6.5 The collection of volatile data has become an essential component of a forensic examiner’s processes. While...

Read more >

Magnet Forensics Releases Internet Evidence Finder v6.5

With the release of Internet Evidence Finder v6.5, Magnet Forensics adds support for Windows Phone, and introduces new triage features including live system artifact recovery capabilities. IEF v6.5 Resource Centre: Blog 1: Analyzing Windows Phone...

Read more >

Speeding Up the Investigation of Employee Policy Violations

If you’re a forensics professional working in a corporate environment, investigating employee policy violations like time theft or inappropriate use of the Internet tend to be a part of your everyday work. While these investigations...

Read more >

Criminal Investigation of a DDos Attack

Learn how digital evidence played a vital role in a real-life Distributed Denial of Service attack. Darren Sabourin, former RCMP Officer, and Jad Saliba explain how Internet evidence was used to: Determine a user’s actions...

Read more >

Find Important Business Apps & OS Artifacts for Your Digital Investigations

HERE’S OUR GUIDE TO FINDING IMPORTANT BUSINESS APPLICATIONS & OS ARTIFACTS FOR YOUR DIGITAL FORENSICS INVESTIGATIONS! Sometimes when conducting digital forensics examinations, investigators can lose sight of the fact that they’re investigating the actions of...

Read more >

Forensic Analysis of Windows Shellbags

This is the fifth and final blog post in a series about recovering Business Applications & OS Artifacts for your digital forensics investigations. What are Shellbags? While shellbags have been available since Windows XP, they...

Read more >

Forensic Analysis of Prefetch files in Windows

This is the fourth blog post in a series of five about recovering Business Applications & OS Artifacts for your digital forensics investigations. What are Prefetch Files? Prefetch files are great artifacts for forensic investigators...

Read more >

Forensic Analysis of LNK files

This is the third blog post in a series of five about recovering Business Applications & OS Artifacts for your digital forensics investigations. What are LNK Files? LNK files are a relatively simple but valuable...

Read more >