Privacy is the basis of democracy. Therefore, sometimes support forensic software developers gets requests like this:
‘We need Software to identify the owner of smartphone & tablets regarding to the data on the phone to avoid deception. We are working for insurances that send us phones from customers who would like to recover their data. We would like to avoid with your software the customer who sends us the phone of someone else. If you have any ideas how I can do this.’
This article will tell how to identify the owner of a mobile device.
Who is the owner of the iOS device?
Before you know who the owner of the iPhone you [...]
The systems of protecting computers and networks are becoming more perfect every day. It’s harder for hackers to find a way to access data on someone else’s computer. A man remains the weakest link in cyber security. Not without reason 95 attacks on computer systems and networks begin with phishing ones. An example of such an attack observed in the last few months is mass mailings of infected Office documents. Thus, hackers try to intercept control on Windows and MacOS computers.
Mobile devices of Apple such as iPhones and iPads are 15% of the mobile market. Therefore, it is often on research in forensic laboratories.
Digital devices are an integral part of our lives. Therefore, digital evidence, namely, evidence obtained from various digital devices, is increasingly used in investigations in the corporation or law enforcement.
Filippo Valsorda published an article on how to install and un-encrypt hard drives on Macs.
David Balaban shared the ransomware timeline for the period from May 2016 to March 2017.