KaffeNews: The Journal
In the first part of this Mobile Forensics Basics series, we had a look on how to collect and preserve digital evidences. This time we will focus on the general methodology related to the acquisition process. Differently from a normal digital device such as a computer, there are many factors that play an important role [...]
The importance of Mobile Forensics is raising every day as the presence of mobile devices in the market increases exponentially. In fact, it becomes every day more common to find personal digital devices such as PDA, multimedia device (iPod, PSP, digital cameras), portable navigation systems, smart phones, etc, the analysis of which gives access to [...]
The acquisition is one of the most important phase of the digital investigation process: any mistake made during this phase will most of the times lead to the inadmissibility in court of the image acquired, making invalid all the evidences found inside the disk. Therefore we can undoubtedly say that the acquisition is very critical. [...]
While going across some of my digital forensics’ notes for the usual “reordering” that happens every now and then, I thought it would be nice to share some of them. The topic I’m going to talk about is, as you can easily guess from the title, Windows XP System Restore. Some of you may argue [...]
StreamArmor 1.1 is out now with couple of bug fixes and few other changes related to minor enhancements. StreamArmor is the sophisticated tool for discovering hidden alternate data streams (ADS) as well as clean them completely from the system. It’s advanced auto analysis coupled with online threat verification mechanism makes it the best tool available [...]
Bad Behavior has blocked 2998 access attempts in the last 7 days.