Mobile 4N6 101
What would you say is the most personal possession that you own? Most would say their cell phone... unless you still have a few journals from high school. And if you do, this is your reminder that it might be time to let those go. It's become increasingly apparent lately how much info our phones collect from us, from the first app you check in the morning after waking up, recent calendar entries, and your actual heart rate by 9 am. The crazy part is most people don't give it a second thought. It doesn't interest us... until something or someone goes missing, then it becomes a road map to whatever it is you did.
In this episode of Security Unlocked, host's Natalia Godyla and Nic Fillingham are joined by Senior Digital Forensics Researcher at Cellebrite, SANS Author and Senior Instructor Sarah Edwards. Sarah walks us through the world of mobile digital forensics while also crushing our dreams on how not so relatable it is to our favorite CSI television shows. She explains what makes mobile forensics unique while incredibly intimate and how a mobile device can be used as part of an attack chain.
In This Episode You Will Learn:
- The specific tools used during a digital forensics investigation
- What the typical threat landscape looks like for mobile devices
- Big trends and changes happening in the past few years
Some Questions We Ask:
- How is mobile forensics particularly unique?
- What is typically looked for during an investigation?
- How is a mobile device used as part of an attack chain?
Listen to: Afternoon Cyber Tea with Ann Johnson
Security Unlocked is produced by Microsoft and distributed as part of The CyberWire Network.