A client comes to our firm to find out whether an intern took unauthorized photos of confidential talking points in order to warn the competition. Though the suspect had a private iPhone, he backed it up to a corporate system. We use the backup to correlate unauthorized activity with corporate policy.
[pdf-embedder url=”http://virtualnex.us/wp-content/uploads/2016/04/How_to_Use_Encrypted_iTunes_Backups_for_SMS_History_without_the_Device_or_Jailbreaking-KaradiG-VirtualNexus-FINAL.pdf”]
Karadi, Gouthum (2014). eForensics Issue 1/2014, © HAKIN9 MEDIA SP. Z O.O. SP. K. 2013
Published in eForensics Magazine:
DIGITAL FORENSICS – HOW TO DO IT – OPEN MAGAZINE – FREE DOWNLOAD