+

ATTENTION! If You're from the US and You'd like to buy a subscribtion please contact us directly at email: joanna.kretowicz@eforensicsmag.com

Android Forensics

April 30, 2013


Magazine Mobile joanna_kretowicz Comments Off
This text is available for purchase but you need to login or register first.

You can buy this for 20 USD

Please register for free account or subscribe and get access to all issues on this website!

You can buy full version this issue or buy subscription and get access to all issues on our website

[Click here to see text]: CREATE FREE ACCOUNT
[Click here to see text]: SUBSCRIBE (221,40 USD/YEAR)
[Click here to see text]: LOG IN

 

eForensics_04_2013-1Dear Readers,

Welcome to new issue of eForensics Mobile. After long period of covering subjects connected with computer and network forensics it’s time for digging into topics related to mobile forensics. We’ve noticed that this topic always draws your attention as forensic study of mobile devices is a relatively new field and it can be particularly challenging on a number of levels . As to start with, this time we shed light on Android Forensics topic. Check what you can find inside:

  1. STEP BY STEP ANALYSIS OF FACEBOOK AND TWITTER DATA ON ANDROID DEVICES

    by Massimo Barone

The growth of social networks is heavily influenced by the burgeoning numbers of smartphones which allow access to these platforms at any time and from any place. A recent study published by Mashable shows that across all the social networking platforms, including Facebook and Google+, it is Twitter that holds the crown for the fastest growing number of active users.

2. EMULATION DETECTION TECHNIQUES FOR ANDROID
by Victor Antonio Torre Villahoz

Android is an operating system widely used in mobile systems. This past year it has been attacked by Malware, due to its proliferation of phones and tablets from many different manufacturers. There are projects like ‘Droidbox’ (sandbox for Android) that allow security researchers to dynamically analyze applications through the use of the emulator included in the SDK.

3. ANDROID FORENSICS A CASE STUDY OF THE NEXUS S VIRTUAL DEVICE

by Caner KOCAMAZ

If you want to learn to examine an Android Device, you don’t have to get one. You can examine any make and model of Android Device virtually. In this case study, we will logically extract SQLite database files from the device emulator.

4. APPROACH TO EXTRACTING DATA USING HARDWARE AND SOFTWARE MECHANISMS

by AdityaMahajan

Android phones have flash and have very limited internal memory which makes it difficult for Forensic Investigators to retrieve deleted data. However acquiring the data through physical acquisition increases the chances of extractingthe deleted data like SMS, call logs, contacts, etc. Also, Android phones are very secure phones, so retrieving data frominternal memory of Android phones under a forensically sound processis possible using hardware extraction tools like Cellebrite UFED or XRY.

5. Comparative research of techniques on BlackBerry OS (incl. PlayBook) and Android OS

by Yury Chemerkin

At present, the BlackBerry holds the palm of insufficient security examination despite of existing approaches more than Android but all security techniques implemented in these mobile devices are indecisive argument on security. Forensics tools may give incredible opportunity to gain all kind of data but there are too many slight objections.

6. POTENTIAL IDENTITY THEFT OVER APPLE’S iOS DEVICES

by Shaikh Javed Hasan Nisar Ahmed

In our day to day life cycle, the demand of mobile phone increased immensely with boundless number of applications and services. The success of Apple’s corporation evidently shows the growing popularity of new generation wireless computing. Hence as the mobile computing had become the part of everyday life of billions of people all around the world, and thus matter of fact, mobile platform is also the biggest target of new generation cybercrimes

7. CELLEBRITE A “STANDARD” IN MOBILE FORENSICS

By Elias Psyllos

As the world of Digital Forensics continues to evolve in the Mobile device sector, one tool that has proven to be reliable is the Cellebrite UFED system.

Unlike computers, where the types of operating systems (Windows based, Mac based, Linux based, etc.) are limited in variations, mobile devices have a wide range of operating systems. This creates one of the biggest challenges in Mobile Forensics.

 

8. TALKING ABOUT TECHNO LAW – INTERVIEW WITH BENJAMIN WRIGHT

by Vaman Amarjeet

 

  1. HOW TO ADDRESS END USER RISK AGREEMENT FOR BYOD by Adesanya Ahmed MBA, CRISC, CGEIT, ACPA, ACMA

Wi-Fi is quickly becoming the primary network connection of choice for workers everywhere. It is now a “must-have” technology for organizations, regardless of how large or small. So much so that a growing number of organizations — from colleges to corporations — have begun adopting bring-your- own-device (BYOD) policies. “The movement to allow a staff member or student to gain access to a network with their personal devices has become very popular.

 

  1. Successful Practices for Bring Your Own Device (BYOD), Data Protection and Your Organization. Interview: Elizabeth Rogers

 

11. LET’S TALK ABOUT SECURITY – interviews with ‘Network Security” speakers

As a proud Official Media Partner of Network Security we would like to draw your attention to this must attend event for anyone working in security and present you interviews with some of the speakers.

ENJOY!

Joanna Kretowicz
EForensics Product Manager
and eForensics Team

This text is available for purchase but you need to login or register first.

You can buy this for 20 USD

Please register for free account or subscribe and get access to all issues on this website!
Android Forensics teaserAndroid Forensics teaser – Teaser
Android Forensics teaser

Follow the steps below to download the magazine:
  1. Register, accept the Disclaimer and choose subscription option.
    Attention!
    By choosing the Free Account option you will only be able to download the teaser of each issue.
  2. Verify your account using the verification link sent to your email address.
  3. Check the password sent on your email address and use it to log in.
  4. Click the download button to get the issue.


IMPORTANT: the registration on the website includes subscription to our newsletter.

You can buy full version this issue or buy subscription and get access to all issues on our website

[Click here to see text]: CREATE FREE ACCOUNT
[Click here to see text]: SUBSCRIBE (221,40 USD/YEAR)
[Click here to see text]: LOG IN

Comments

Tagged with:

Comments are closed.


IT MAGAZINES: Hakin9 Magazine | Pentest Magazine | eForensics Magazine | Software Developer's Journal | Hadoop Magazine | Java Magazine
IT Blogs: Hakin9 Magazine Blog | Pentest Magazine Blog | eForensics Magazine Blog | Software Developer's Journal Blog | Hadoop Magazine Blog | Java Magazine Blog
IT ONLINE COURSES: Pentest Laboratory
JOB OFFERS FOR IT SPECIALIST: Jobs on Hakin9 Magazine | Jobs on Pentest Magazine | Jobs on eForensics Magazine | Jobs on Software Developer's Journal | Jobs on Java Magazine | Jobs on Hadoop Magazine
Hakin9 Media Sp. z o.o. Sp. komandytowa ul. Postępu 17D, 02-676 Warszawa