Security Experts:

Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Compliance

Guidance Software Adds Digital Forensics for Apple iPad and iPhone 4

Guidance Software updated its mobile forensic tool to help digital investigators perform forensic analysis and e-discovery on iPad, iPhone 4 and iPod touch devices.

The iPad, iPhone 4 and iPod touch frenzy on both the consumer and corporate fronts accelerates the need for law enforcement, security analysts and e-discovery specialists to review and collect forensic data from these popular devices.

Guidance Software updated its mobile forensic tool to help digital investigators perform forensic analysis and e-discovery on iPad, iPhone 4 and iPod touch devices.

The iPad, iPhone 4 and iPod touch frenzy on both the consumer and corporate fronts accelerates the need for law enforcement, security analysts and e-discovery specialists to review and collect forensic data from these popular devices.

The latest version of the soltion, EnCase Neutrino, helps investigators forensically capture and process mobile device data for analysis and review alongside other collected data in either EnCase® Enterprise or EnCase® Forensic. The previous version featured hardware support and parsing capabilities for common mobile device manufacturers, including Nokia, Motorola, Samsung, Siemens, LG, Palm, BlackBerry®, HTC, UTStarcom, Sony Ericsson and more. Investigators can collect potentially relevant ESI stored in the mobile device’s settings, contacts, call logs, messages, calendar appointments and other files.

Related: Mobile & Smart Device Security Survey Results – Concern Grows as Vulnerable Devices Proliferate

“As we do digital investigations, we’re encountering more Apple devices including iPads and iPhones,” said Detective Andy Kleinick, Officer-in-Charge, LAPD, Computer Crimes Unit. “EnCase has been our primary digital forensics software for more than ten years. By supporting these popular devices Guidance Software will greatly assist my Department in collecting and analyzing these new forms of evidence through a court-vetted and effective tool.”

“Few organizations allow the connection of personal computers to a corporate network but, for some reason, many are fine with allowing employees to bring personal smart phones into the office – some going so far as to allow Wi-Fi-capable devices to connect to the corporate wireless network,” said Andrew Hay, senior security analyst, Enterprise Security Program for The 451 Group. “With this new support for iPhone and iPad, Guidance Software can help analysts using its products to overlay traditional forensic and incident response strategies to one of the most prolific mobile device architectures in use today.”

Apple sold a record 7.33 million iPads and 16.24 million iPhones in the quarter ended December 25, 2010.

Written By

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Expert Insights

Related Content

Cybercrime

The FBI dismantled the network of the prolific Hive ransomware gang and seized infrastructure in Los Angeles that was used for the operation.

Ransomware

US government reminds the public that a reward of up to $10 million is offered for information on cybercriminals, including members of the Hive...

Mobile & Wireless

Apple rolled out iOS 16.3 and macOS Ventura 13.2 to cover serious security vulnerabilities.

Mobile & Wireless

Technical details published for an Arm Mali GPU flaw leading to arbitrary kernel code execution and root on Pixel 6.

Ransomware

The Hive ransomware website has been seized as part of an operation that involved law enforcement in 10 countries.

Mobile & Wireless

Apple’s iOS 12.5.7 update patches CVE-2022-42856, an actively exploited vulnerability, in old iPhones and iPads.

Cybercrime

No one combatting cybercrime knows everything, but everyone in the battle has some intelligence to contribute to the larger knowledge base.

Mobile & Wireless

Two vulnerabilities in Samsung’s Galaxy Store that could be exploited to install applications or execute JavaScript code by launching a web page.