Security Unlocked 10.13.21
Ep 48 | 10.13.21

Mobile 4N6 101

Show Notes

What would you say is the most personal possession that you own? Most would say their cell phone... unless you still have a few journals from high school. And if you do, this is your reminder that it might be time to let those go. It's become increasingly apparent lately how much info our phones collect from us, from the first app you check in the morning after waking up, recent calendar entries, and your actual heart rate by 9 am. The crazy part is most people don't give it a second thought. It doesn't interest us... until something or someone goes missing, then it becomes a road map to whatever it is you did. 

In this episode of Security Unlocked, host's Natalia Godyla and Nic Fillingham are joined by Senior Digital Forensics Researcher at Cellebrite, SANS Author and Senior Instructor Sarah Edwards. Sarah walks us through the world of mobile digital forensics while also crushing our dreams on how not so relatable it is to our favorite CSI television shows. She explains what makes mobile forensics unique while incredibly intimate and how a mobile device can be used as part of an attack chain.  

In This Episode You Will Learn: 

  • The specific tools used during a digital forensics investigation 
  • What the typical threat landscape looks like for mobile devices 
  • Big trends and changes happening in the past few years 

Some Questions We Ask: 

  • How is mobile forensics particularly unique? 
  • ​​What is typically looked for during an investigation?  
  • How is a mobile device used as part of an attack chain? 

Resources: 

mac4n6.com 

View Sarah Edwards on LinkedIn 

View Microsoft Security Blog 

Related:   

Listen to: Afternoon Cyber Tea with Ann Johnson 

Listen to: Security Unlocked: CISO Series with Bret Arsenault 

Discover and follow other Microsoft podcasts at microsoft.com/podcasts  


Security Unlocked is produced by Microsoft and distributed as part of The CyberWire Network.