Insider Threats! Using Magnet AXIOM to Prevent and Investigate Intellectual Property Theft

The following blog post is a guest post by Ryan Duquette, MSc, CFE, CFCE, Founder and Principal, HEXIGENT Consulting. In July 2015, the FBI, in collaboration with the National Counterintelligence and Security Center, launched a campaign to educate businesses and industry leaders about protecting trade secrets and intellectual property. The campaign, which continues to this day, focuses on … Continued

Supporting the Unsupported: Locating and Analyzing Information from New Mobile Apps

By Christopher Vance, Magnet Forensics Trainer. Read more about Christopher in this Trainer profile. There are currently millions of applications on the iOS App Store and Google Play marketplace. With millions of third party applications available to people, there’s a limitless source of applications that could appear in forensic investigations. Due to the sheer number … Continued

How to Acquire an iOS 11 Device Without the PIN/Passcode

As you may be aware, iOS 11 changed the way in which the user authenticates a trust relationship between an iOS device and the computer being used to create a backup or forensic tool being used to create an acquisition.  When a forensic examiner goes to create an iOS backup, either with a forensic tool … Continued

AX300 Brings Advanced Mobile Forensics to Magnet Forensics’ Training Suite

AXIOM Examinations (AX200) also now available as an online self-paced course. We have just introduced a new course for digital forensics experts who are looking to expand the capabilities of their mobile forensics investigations: Magnet AXIOM Advanced Mobile Forensics (AX300.) The course is an expert-level four-day training course, designed for participants who are familiar with the … Continued

How to Acquire and Analyze Cloud Data with Magnet AXIOM Cloud

With Magnet AXIOM, users can acquire data from multiple cloud sources, such as Apple, Google, Facebook, Microsoft, Dropbox, Twitter, WhatsApp and more. AXIOM supports multiple acquisition and account sign-in methods, including username and password, external browser authentication, and account tokens from mobile extractions. Within each of these sources there may be several services, apps, or … Continued

A Roundup of Magnet Forensics Android Recovery Resources

Since launching our Samsung Android custom recovery flashing mobile acquisition method in June, we’ve spent the summer building up a cache of resources to help you get the most out of this new capability. Start with our overview blog post on how to find and load recovery images within AXIOM Process. From there, check out … Continued

AXIOM Cloud Q&A with Tayfun Uzun: Part 1

Magnet Forensics recently announced that we will offer Magnet AXIOM Cloud for cloud forensics. This new product will integrate seamlessly with our other AXIOM products to give investigative teams a comprehensive, single view into the digital evidence in a case. We had the opportunity to sit down with Tayfun Uzun, Product Manager here at Magnet … Continued

Using F-Response and Magnet AXIOM: Use Case 2 – Preview No Artifacts

When conducting remote enterprise investigations, one of the biggest challenges is pulling large amounts of data over the network. Previously we’ve discussed how to use F-Response Enterprise and Magnet AXIOM (Using F-Response and Magnet AXIOM to Conduct Enterprise Investigations) to acquire and analyze remote machines. We’ve also discussed how to conduct a targeted acquisition (Using … Continued

Using F-Response and Magnet AXIOM: Use Case 1 – Targeted Acquisition

In our first F-Response and Magnet AXIOM blog post (Using F-Response and Magnet AXIOM to Conduct Enterprise Investigations), we discussed set up and acquisition methods. Here we will discuss a specific use case: Targeted Acquisition.  Even with decent network infrastructure, the bottleneck for a proper forensic investigation on a remote host will always be the … Continued

Using F-Response and Magnet AXIOM to Conduct Enterprise Investigations

One major difference between law enforcement and corporate investigations is that corporate investigations may span across several countries or regions whereas LE typically deals with cases within their own city/state/region/etc. One of the challenges of corporate investigations is that you won’t normally have examiners in each of these locations so there is a requirement to … Continued