iOS 11.4’s USB Restricted Mode prevents tethered cracking attempts, Lightning becomes charge-only
iOS 11.4 should be released within the next several weeks. With that, Apple could be implementing further security protocols on iOS that prevent devices to be used with a Mac or PC after 7 days of not unlocking the...
Read moreHTCI CEO Appointed 1st Vice President of HTCIA Carolina’s
Stephen Pearson the CEO of HTCI was appointed to the position of 1st Vice President of the Carolina chapter of HTCIA. Stephen stated that it was a great privilege to be appointed to this position and that he hopes...
Read moreYes, Cops Are Now Opening iPhones With Dead People’s Fingerprints
In November 2016, around seven hours after Abdul Razak Ali Artan had mowed down a group of people in his car, gone on a stabbing spree with a butcher’s knife and been shot dead by a police officer on the grounds of Ohio...
Read moreStephen Pearson presents paper on a refinement to the Exploitation SIDS framework
Stephen Pearson will be presenting the paper “Proposing a Change to the SIDSS Framework for Technical Exploitation Operations: Advancing the inclusion of Preparation & Triage to the SIDSS Framework” at the International Academy of Business Economics (http://www.iabe.org). The paper...
Read moreParaben adds MapLink Integration
Paraben Corporation, an innovator in the digital forensic market, along with HTCI, a developer of cutting-edge digital forensic training, is pleased to announce the integration of HTCI’s MapLink tool into Paraben’s E3 platform. Paraben and HTCI are committed to...
Read moreDJI Threatens Hacker
After computer researcher Kevin Finisterre exposed details of his intrusion into the servers of the world’s leading consumer drone maker, gaining access to sensitive customer information, DJI pushed back. Ars Technica breaks down the details. Read more >
Read moreThe Supreme Court could soon change the course of how location data is used
The courts of the 21st century are being tasked with 21st-century issues, namely those related to smartphones and their data. From data stored on iPhones to location data associated with other mobile devices, these tiny pieces of technology are presenting big...
Read moreSmall Words in an Email Can Reveal a Person’s Identity
It’s possible to identify the author of an email by analysing as little as two words, research by Nottingham Trent University suggests. Dr. David Wright, an expert in forensic linguistics, examined thousands of emails to show it’s possible to...
Read moreWhite House High on Drones, FAA Gets Tech to Help Manage Them
A memo signed by President Donald Trump on Oct. 25 calls for an UAS Integration Pilot Program to be stood up within the next 90 days. Under the program, the Federal Aviation Administration will work with state, local and...
Read more