archives

device forensics

This tag is associated with 2 posts

How To Use Magnet AXIOM In Mac USB Investigations

Hey everyone, Trey Amick from Magnet Forensics here. Today we’re talking about Mac USB investigations, and what happens when we’ve been alerted that a USB has been inserted into an end point. Different organisations handle USB policies differently. Some have alerting mechanisms in place for when USBs are detected, while others may encrypt the drive … Continue reading

Mobile Virtual Network Operators (MVNOs) In The US

by Patrick Siewart  Increasingly, cellular records and their associated location information are being used in civil litigation, where previously they were considered to be a “law enforcement only” tool.  But in the age when users carry at least one smartphone with them at all times, the location data with regard to calls / texts / … Continue reading

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Join 1,291 other followers