Category Archives: Mobile Device Forensics

Mobile Mayhem: Smartphones and Security (Or the Lack Thereof)

By Adam Cohen

“It’s a mobile jungle out there, and your corporate data is too valuable to just bungle through it.”

Little computers, generically called “mobile devices,” are everywhere, like creatures sharing our environment with non-digital animals and insects. They come in all shapes and sizes: tablets as big as flat-screen TVs; wearable technology such as the Apple Watch, fitness bracelet or Bluetooth headset; and the undisputed king of mobile devices, our inseparable personal parasite — the smartphone. Not only do these devices share our “physical” environment, they permeate our information technology environment. Connected in the atmosphere of the Internet, mobile devices breathe by inhaling and exhaling data, which travels across the globe, nearly instantaneously. Continue reading Mobile Mayhem: Smartphones and Security (Or the Lack Thereof)

The Trouble with Mobile Device Forensics

By David Kalat

The first problem with mobile device forensics is the name. “Mobile devices” is a catch-all term meant to encompass cell phones, smartphones, tablets, and hybrid “phablets.” But even these terms are inherently misleading—they imply that we are talking about phones. In 2011, physicist Michio Kaku noted that today’s mobile “phones” have more computing power than all of the computers NASA used to land astronauts on the moon.[1] The average mobile “phone” today easily outstrips the power of the Cray, Deep Blue, or any supercomputer of a generation ago.[2] Current models have faster processors, access to more storage, better network connectivity, and more robust software than the average PC from just 10 years ago. We call them “phones” at our peril—they are powerful computers that just happen to be able to place calls as well.

Continue reading The Trouble with Mobile Device Forensics