MOBILE FORENSICS

Download
File
eForensics_Mobile_Magazine.pdf

INTERVIEW WITH CHRISTIAAN BEEK
by Vaman Amarjeet and eForensics Team
Christiaan Beek – the expert of this month’s issue – is answering questions concerning digital forensic investigation and incident response.

ANDROID PHONE: TABLET URL JAVASCRIPT VULNERABILITY
by Larry Smith, Donald Cinco
In this article, Larry Smith and Donald Cinco present what they discovered after the installation of  a ‘social share’ widget.

SIP CALL FORENSIC ANALYSIS
by Jan Tilo Kirchhoff
It all started during my 2011 summer vacation.  One evening my mobile started ringing but when I finally got to it and accepted the call there was no one on the line…. Jan Kirchhoff presents the investigation he conducted in order to detect the source and reason of the mysterious calls.

ISSUES IN MOBILE DEVICE FORENSICS
by Eamon Doherty, PHD, SSCP, CCP, CCE
This article discusses examples of usage of these mobile devices and accessories and the tools, that one may encounter on suspect during an investigation.

MOBILE PHONE FORENSICS: CHALLENGE OF THE FUTURE
by prof. M. Tahar-Kechadi, dr Lamin Aouad
This article shares some thoughts about the reasons leading to the rapid development of mobile ecosystems.

HOW CAN SOFTWARE HELP SMARTPHONE FORENSICS?
by Alessandro Distefano
The author presents how Software Mobile Forensics can ease several concerns of the current Mobile Forensics tasks.

AN INTRODUCTION TO NETWORK ANALISYS
by Scott Taylor
Scott Taylor shows some helpful tricks, which may come in handy when a problem with traffic identification or other operational activities arises.

ANDREW HOOG “ANDROID FORENSICS”
by Apurva Rustagi
Apurva Rustagi, in his review of “Android Forensics”written by Andrew Hoog, writes about the distinctive qualities of this book.  He persuades that this publication won’t disappoint any forensic practitioner, irrespective of their ‘stage of initiation’.

CYBER AGENTS: HACKING EXTORTION CASE
by Eric Lakes
In this story, Eric Lakes and sergeant Randy, investigators at Cyber Agents do their best to prove their client innocent and to outwit his smart wife.

INTEGRATING CYBER FORENSICS IN INCIDENT RESPONSE
by Mukesh Saini
The article deliberates over the necessity and importance of the DEFR in an organization, private company or a government department.

SECURITY TESTING TOOL OR CYBER WEAPON
by Kevin Coleman
In this article, Kevin Coleman stresses the burning need to provide clear distinction between Security Testing Tool and Cyber Weapon. His surprising remarks clearly pertain to the problem of nomenclature in the current regulatory system.


Download
File
eForensics_Mobile_Magazine.pdf

July 30, 2021
Subscribe
Notify of
guest

0 Comments
Inline Feedbacks
View all comments
© HAKIN9 MEDIA SP. Z O.O. SP. K. 2023