Investigating Sexual Crimes in the Tinder Age

The usage of location-based mobile dating applications like Tinder and Grindr has exploded over the last year. This new class of mobile app allows singles to identify, chat with, and meet other singles located in...

Read more >

Speeding Up the Investigation of Employee Policy Violations

If you’re a forensics professional working in a corporate environment, investigating employee policy violations like time theft or inappropriate use of the Internet tend to be a part of your everyday work. While these investigations...

Read more >

Criminal Investigation of a DDos Attack

Learn how digital evidence played a vital role in a real-life Distributed Denial of Service attack. Darren Sabourin, former RCMP Officer, and Jad Saliba explain how Internet evidence was used to: Determine a user’s actions...

Read more >

Investigating Child Exploitation Cases: Webinar Q&A

On Wednesday, May 28th, Magnet Forensics CTO, Jad Saliba and Forensics Consultant, Jamie McQuaid hosted a webinar on investigating child exploitation cases. Attendees learned how to identify a suspect online using chat and IP address...

Read more >

Investigating IP Theft – Computers, Smartphones and the Cloud

In the first half of this IP forensics webinar, Heather Mahalik from SANS Institute offers tactical considerations for examining smartphone, cloud and computer artifacts in the event of intellectual property theft. She explores the challenges...

Read more >

Webinar: Geolocation Artifacts and Timeline Analysis in Digital Forensics

In this webinar, Jad Saliba, Founder and CTO of Magnet Forensics, will take you through a fictional case study involving child luring that leads to murder. You will discover how digital forensics, geolocation artifacts and...

Read more >
12345 Next >