Category Archives: Technology

Device Handling and Evidence Processing Analysis

Device Handling and Evidence Processing Analysis

-Ritik Singh This protocol contains several rules which covers all the steps needed to comply with for completing all the process which is described below. Collection. Acquisition/imaging. Analysis Reporting. Collection:- As moving towards the collection of evidence from resources such as storage drive, hard drive, hard disk, cloud data, social media account or another digital

The Worst Mistakes in iOS Forensics

The Worst Mistakes in iOS Forensics  by Vladimir Katalov What can possibly go wrong with that iPhone? I’ll have a look (oh, it’s locked!), then switch it off, eject the SIM card and pass it on to the expert. Well, you’ve just made three of the five most common mistakes making subsequent unlock and extraction

Forensic guide to iMessage, WhatsApp, Telegram, Signal and Skype data acquisition

Forensic guide to iMessage, WhatsApp, Telegram, Signal and Skype data acquisition

Forensic guide to iMessage, WhatsApp, Telegram, Signal and Skype data acquisition  by Vladimir Katalov Instant messaging apps have become the de-facto standard of real-time, text-based communications. The acquisition of instant messaging chats and communication histories can be extremely important for an investigation. In this article, we compare the five top instant messaging apps for iOS

FAW 8 PREVIEW

FAW 8 PREVIEW

The forensic acquisition of content, sites or web pages is a service that with the evolution of digital technology has become increasingly in demand as it allows the evidence and contents to be crystallized in the exact moment before they are removed or modified. Complete websites or individual pages, social networks (Facebook, Twitter, Instagram, Linkedin,