Mobile Forensic Analysis: A Case Study Walkthrough – Part 02 – Forensics analysis of the suspicious device
Before beginning the forensic analysis, we will take time to clearly explain each step to the person at risk in simple, non-technical terms. This ensures they fully understand the process, including the types of private information that might be collected, such as SMS messages, apps installed and temporary files, among other.