Some stats from our Digital Forensics Now Podcast audio version for 2025.
Thank you so much for geeking out without this past year. Let's keep it going on 2026!
https://digitalforensicsnow.buzzsprout.com/
Some stats from our Digital Forensics Now Podcast audio version for 2025.
Thank you so much for geeking out without this past year. Let's keep it going on 2026!
https://digitalforensicsnow.buzzsprout.com/
Coming back to work after the holidays.
wa-crypt-tools is an open-source toolkit for handling encrypted WhatsApp backups (.crypt12/.crypt14/.crypt15) when the legitimate key is available.
The project supports protobuf-based formats, integrates with forensic workflows, and is frequently cited in research on E2EE behavior, message retention, and backup security. It reinforces that encryption remains intact - access hinges on key control, not exploitation.
How do you see tools like this shaping future mobile forensic standards?
Source: https://cybersecuritynews.com/whatsapp-crypt-tool/
Engage in the discussion and follow @technadu for technically grounded security coverage.
#InfoSec #MobileForensics #EncryptionResearch #OpenSourceSecurity #PrivacyEngineering #TechNadu
Recently I learned that media generated by known #AI services will add provenance information in IPTC and C2PA metadata fields. In order to learn about these fields I made a script that leverages exiftool.org and C2PA python libraries to highlight these AI fields easily. Use the --json and/or --flattened arguments to show all fields.
The script can process one file or all files in a directory. This is an easy way to detect AI manipulation in unsophisticated scenarios.
The code can be downloaded here:
Necessity is the mother of invention. In my case it was the reason to put a python wrapper around the ffprobe functionality from FFMPEG.
The script gives frame counts, frames per second, extracts frame pixel content with hashes, and much more.
Interesting opinion from the Eleventh Circuit regarding video frames and sentencing guidelines in CSAM cases:
https://media.ca11.uscourts.gov/opinions/pub/files/202310697.pdf
Get the script here:
https://github.com/abrignoni/frame-counts-galore
What I hear vs what I see.
Your smartphone holds your memories, contacts, messages, and even business data — all in a device that can fail in an instant.
🔍 Learn about:
✅ What data can (and can’t) be recovered
🔧 Logical vs. physical damage: why it matters
🔐 Encryption challenges on modern devices
⚖️ The role of digital forensics in investigations
👉 Read the full guide:
https://www.endoacustica.com/blogen/2025/11/07/mobile-data-recovery-techniques-limits-and-professional-solutions/
#DataRecovery #MobileForensics #DigitalSecurity #SmartphoneSafety
Same with how many drives are imaged and/or how many devices are extracted.
📱 Hai mai cancellato per sbaglio foto, chat o documenti importanti dal tuo smartphone? O peggio, il dispositivo si è rotto e temi di aver perso tutto?
Il recupero dati da dispositivi mobili non è magia: è scienza.
Dai guasti software alla caduta in acqua, dalla formattazione accidentale ai blocchi da password dimenticata — i dati possono essere ancora lì, anche se non li vedi.
#mobileforensics #sicurezzainformatica #datarecovery #tecnologia #endoacustica
"One of generative AI's biggest risk factors, the ability to inspire confidence independent of reality."
Read The Register's Article here: https://www.theregister.com/2025/11/24/opinion_column_vibe_coding/
Validate your tools & processes, verify your data inputs. It is a must on #DigitalForensics & #MobileForensics.
Check out Six Steps To Successful Mobile Validation for more information on the topic ➡️ https://www.sans.org/white-papers/six-steps-to-successful-mobile-validation
In #DigitalForensics:
📍Not all data sources are the same quality.
📍Looking like a coordinate is not the same as being one.
📍A found coordinate does not mean that the phone was there.
📍If you don't test you assume. And when you assume 🫏
But they did bring me the SDCard adapter with no SDCard in it.
#DigitalForensics #DFIR #MobileForensics #AnySimilarityToTrueEventsIsCoincidental
🎃 Happy #DigitalForensics Halloween 👻
It's everywhere...
Si Biles reviews Oxygen Forensics’ Extraction in a Box (XiB) course, a practical deep dive into advanced mobile data extraction. https://www.forensicfocus.com/reviews/oxygen-forensics-training-extraction-in-a-box-xib/ #OxygenForensics #MobileForensics #DFIRTraining #DigitalForensics
🙏Thanks to Forensic Focus and Matthew Plascencia for mentioning the LEAPPs alongside awesome tools like Christian Peter UFADE and Lionel Notari Apple Unified Log acquisition and parsing.
📖 Read the interview here:
https://www.forensicfocus.com/interviews/matthew-plascencia-digital-forensic-investigator-exhibit-a-cyber/
Digital Forensic Investigator Matthew Plascencia discusses his journey from data recovery to mobile forensics, the tools he trusts, and how learning in public helped launch his career. https://www.forensicfocus.com/interviews/matthew-plascencia-digital-forensic-investigator-exhibit-a-cyber/ #MobileForensics #DigitalForensics #DFIR
Don’t miss Magnet Forensics’ Mobile Unpacked with Chris Vance as he unpacks iOS 26’s biggest forensic changes and challenges—register now! https://www.forensicfocus.com/news/upcoming-webinar-s3e9-now-thats-what-i-call-ios-26/ #MagnetForensics #MobileForensics
Don’t miss Magnet Forensics’ Mobile Unpacked with Chris Vance as he unpacks iOS 26’s biggest forensic changes and challenges—register now! https://www.forensicfocus.com/news/upcoming-webinar-s3e9-now-thats-what-i-call-ios-26/ #MagnetForensics #MobileForensics