Loading...

Category Archives: Forensics

Device Handling and Evidence Processing Analysis

Device Handling and Evidence Processing Analysis

-Ritik Singh This protocol contains several rules which covers all the steps needed to comply with for completing all the process which is described below. Collection. Acquisition/imaging. Analysis Reporting. Collection:- As moving towards the collection of evidence from resources such as storage drive, hard drive, hard disk, cloud data, social media account or another digital

Forensic guide to iMessage, WhatsApp, Telegram, Signal and Skype data acquisition

Forensic guide to iMessage, WhatsApp, Telegram, Signal and Skype data acquisition

Forensic guide to iMessage, WhatsApp, Telegram, Signal and Skype data acquisition  by Vladimir Katalov Instant messaging apps have become the de-facto standard of real-time, text-based communications. The acquisition of instant messaging chats and communication histories can be extremely important for an investigation. In this article, we compare the five top instant messaging apps for iOS

FAW 8 PREVIEW

FAW 8 PREVIEW

The forensic acquisition of content, sites or web pages is a service that with the evolution of digital technology has become increasingly in demand as it allows the evidence and contents to be crystallized in the exact moment before they are removed or modified. Complete websites or individual pages, social networks (Facebook, Twitter, Instagram, Linkedin,

New Security Measures in iOS 11 and Their Forensic Implications by Oleg Afonin

This post is reproduced as it is from from https://blog.elcomsoft.com/2017/09/new-security-measures-in-ios-11-and-their-forensic-implications/   Apple is about to launch its next-generation iOS in just a few days. Researching developer betas, we discovered that iOS 11 implements a number of new security measures. The purpose of these measures is better protecting the privacy of Apple customers and once again increasing