Mobile 4N6 101
Security Unlocked
English - October 13, 2021 07:05 - 35 minutes - ★★★★ - 56 ratingsTechnology security security ai artificial intelligence machine learning microsoft microsoft security microsoft ai microsoft ml microsoft security ai nic fillingham Homepage Download Apple Podcasts Google Podcasts Overcast Castro Pocket Casts RSS feed
What would you say is the most personal possession that you own? Most would say their cell phone... unless you still have a few journals from high school. And if you do, this is your reminder that it might be time to let those go. It's become increasingly apparent lately how much info our phones collect from us, from the first app you check in the morning after waking up, recent calendar entries, and your actual heart rate by 9 am. The crazy part is most people don't give it a second thought. It doesn't interest us... until something or someone goes missing, then it becomes a road map to whatever it is you did.
In this episode of Security Unlocked, host's Natalia Godyla and Nic Fillingham are joined by Senior Digital Forensics Researcher at Cellebrite, SANS Author and Senior Instructor Sarah Edwards. Sarah walks us through the world of mobile digital forensics while also crushing our dreams on how not so relatable it is to our favorite CSI television shows. She explains what makes mobile forensics unique while incredibly intimate and how a mobile device can be used as part of an attack chain.
In This Episode You Will Learn:
The specific tools used during a digital forensics investigation
What the typical threat landscape looks like for mobile devices
Big trends and changes happening in the past few years
Some Questions We Ask:
How is mobile forensics particularly unique?
What is typically looked for during an investigation?
How is a mobile device used as part of an attack chain?
Resources:
mac4n6.com
View Sarah Edwards on LinkedIn
View Nic on LinkedIn
View Natalia on LinkedIn
View Microsoft Security Blog
Related:
Listen to: Afternoon Cyber Tea with Ann Johnson
Listen to: Security Unlocked: CISO Series with Bret Arsenault
Discover and follow other Microsoft podcasts at microsoft.com/podcasts
Security Unlocked is produced by Microsoft and distributed as part of The CyberWire Network.
What would you say is the most personal possession that you own? Most would say their cell phone... unless you still have a few journals from high school. And if you do, this is your reminder that it might be time to let those go. It's become increasingly apparent lately how much info our phones collect from us, from the first app you check in the morning after waking up, recent calendar entries, and your actual heart rate by 9 am. The crazy part is most people don't give it a second thought. It doesn't interest us... until something or someone goes missing, then it becomes a road map to whatever it is you did.
In this episode of Security Unlocked, host's Natalia Godyla and Nic Fillingham are joined by Senior Digital Forensics Researcher at Cellebrite, SANS Author and Senior Instructor Sarah Edwards. Sarah walks us through the world of mobile digital forensics while also crushing our dreams on how not so relatable it is to our favorite CSI television shows. She explains what makes mobile forensics unique while incredibly intimate and how a mobile device can be used as part of an attack chain.
In This Episode You Will Learn:
The specific tools used during a digital forensics investigation
What the typical threat landscape looks like for mobile devices
Big trends and changes happening in the past few years
Some Questions We Ask:
How is mobile forensics particularly unique?
What is typically looked for during an investigation?
How is a mobile device used as part of an attack chain?
Resources:
View Sarah Edwards on LinkedIn
View Nic on LinkedIn
View Natalia on LinkedIn
Related:
Listen to: Afternoon Cyber Tea with Ann Johnson
Listen to: Security Unlocked: CISO Series with Bret Arsenault
Discover and follow other Microsoft podcasts at microsoft.com/podcasts
Security Unlocked is produced by Microsoft and distributed as part of The CyberWire Network.