Apple Forensics – iPhone, iPod, and iPad Forensics

There are several ways that we can collect and obtain data from an iPhone or Apple mobile device. The first option is to have physical access to the device. Each model and version of iPhone, iPod, and iPad have different levels of support, but each can be obtained in some forensic fas
Continue Reading →

Android & iPhone’s Growing Malware Problem – MFC 2012

Wednesday mornings keynote speaker was Chet Hosmer. Mr. Hosmer is the Chief Scientist at Wetstone Allen. The realm of digital and network security has changed dramatically. Think back to before smart phone devices, as a network security manager. You only had to worry about the network
Continue Reading →

CEIC 2012 Day 3 – Time Bandits (Time Line Analysis)

For the second time I had the opportunity to sit through a session taught by Rob Lee. If you have not had the chance to learn from Rob or hear him speak you are missing out. The crowds seem to follow Rob and this session was no different. Within minutes the largest session room at the
Continue Reading →