Hex & Text Viewer

Every forensic examiner is familiar with hex and text viewers; they are the cornerstone of the most basic forensic examination. If all your tools and scripts fail or don’t support a given artifact, you can...

Read more >

Acquiring Memory with Magnet RAM Capture

Recently, we released a new free tool that allows investigators to acquire the memory of a live PC. Customers using our IEF Triage module will already be familiar with this tool, as it’s used to...

Read more >

Picture and Video Analysis Improvements in IEF v6.5

This is the seventh and final blog post in a about the new features included in IEF v6.5 Visual evidence often tells the most compelling story, which is why we have made some improvements to...

Read more >

Improved Analysis Features in IEF v6.5

This is the fourth blog post in a series of seven about the new features included in IEF v6.5 With the release of IEF v6.5, we’ve added a number of key features to help you...

Read more >

Recovering Live System Artifacts with IEF

This is the third blog post in a series of seven about the new features included in IEF v6.5 The collection of volatile data has become an essential component of a forensic examiner’s processes. While...

Read more >

Magnet Forensics Releases Internet Evidence Finder v6.5

With the release of Internet Evidence Finder v6.5, Magnet Forensics adds support for Windows Phone, and introduces new triage features including live system artifact recovery capabilities. IEF v6.5 Resource Centre: Blog 1: Analyzing Windows Phone...

Read more >

Speeding Up the Investigation of Employee Policy Violations

If you’re a forensics professional working in a corporate environment, investigating employee policy violations like time theft or inappropriate use of the Internet tend to be a part of your everyday work. While these investigations...

Read more >

Criminal Investigation of a DDos Attack

Learn how digital evidence played a vital role in a real-life Distributed Denial of Service attack. Darren Sabourin, former RCMP Officer, and Jad Saliba explain how Internet evidence was used to: Determine a user’s actions...

Read more >

Find Important Business Apps & OS Artifacts for Your Digital Investigations

HERE’S OUR GUIDE TO FINDING IMPORTANT BUSINESS APPLICATIONS & OS ARTIFACTS FOR YOUR DIGITAL FORENSICS INVESTIGATIONS! Sometimes when conducting digital forensics examinations, investigators can lose sight of the fact that they’re investigating the actions of...

Read more >