White Paper: 4 Steps to Forensic Windows Password Cracking

Your Guide to a Repeatable Process for Determining and Retrieving User Passwords Download the white paper today! In late 2016, Microsoft introduced a large anniversary update for Windows 10, which included changes to the standard...

Read more >

Magnet AXIOM 1.2.3 Improves Smartphone Acquisition

Customers can now get the latest version of Magnet AXIOM over at the Customer Portal! Magnet AXIOM 1.2.3 improves smartphone acquisition, provides innovative new time filtering capabilities, enhancements to AXIOM Examine and AXIOM Cloud, offers...

Read more >

Revisit the Top 5 Magnet Forensics Webinars of 2017

We’re gearing up for our first webinar of 2018, “How the Onset of Security Apps is Impacting Investigations” on January 30. Jessica Hyde, our Director of Forensics, will look into vault and security apps including...

Read more >

Job Hunting in the DFIR Field

For those who don’t know, in addition to my work at Magnet Forensics, I teach Mobile Device Forensics at George Mason University. In addition to teaching the skills necessary to acquire and parse data from...

Read more >

Being Forensically Curious: The Process of Scripting

Our in-depth three-step forensic research methodology series, which started with “The Process of Discovery,” led to “The Process of Testing” and “The Process of Finding and Parsing,” concludes today with our final blog, “The Process...

Read more >