About Jon Hansen

This author has not yet filled in any details.
So far Jon Hansen has created 299 blog entries.

“The next generation of blockchain solutions are here to secure the world digital future.”  – BlockChain Security

2023-12-18T21:52:33-07:00October 2nd, 2023|Tags: , , , , , , |

BlockChain Security provides applications and solutions in the fields of blockchain, evidence preservation, cyber, smartphone/mobile devices, and digital computer forensics. BlockChain Security solutions is for individuals, businesses, cyber security teams,  government agencies, military and intelligence groups. Our solutions include digital [...]

Crypto-Triage your frontline Crypto Tracking Tool

2023-12-18T21:29:59-07:00September 18th, 2023|Tags: , , , , , |

Empower early investigation with Crypto Triage Smart AI Modeling integrated by global database. Our portable case software ensures seamless, private sharing and simplifies complex crypto transaction through quick searches of single wallet address or cases. Crypto Triage presents its Smart [...]

Magnet AXIOM Cyber 7.5 is now Available

2023-12-18T20:44:39-07:00September 13th, 2023|Tags: , , , , , , , , , , |

Initiate Processing of Mobile Images From a VeraKey VeraKey is a forensic solution that enables consent-based, full file system data extractions from iOS and Android devices. The combination of AXIOM Cyber and VeraKey gets you the most evidence so you [...]

The all-in-one forensic decryption solution: Passware Kit Ultimate

2023-12-26T12:40:55-07:00September 12th, 2023|Tags: , , , , , , , , , , , , , , , , |

Passware Kit Ultimate The tool that is is the all-purpose encryption detection and decryption solution that allows investigators to access data from computers, disks, files, and mobile devices. Passware forensic products are used by the world’s top law enforcement agencies [...]

Magnet Forensics Acquires Griffeye, a Leading Digital Media Forensics Software Firm

2023-08-22T17:16:30-06:00August 22nd, 2023|Tags: , , , , , , , , , , , |

Magnet Forensics Inc., a developer of digital investigation solutions for more than 4,000 enterprises and public safety agencies in over 100 countries, announced today that it has acquired Griffeye, a world leader in digital media forensics for child sexual abuse [...]

JTAG, ISP, Chip-Off, and IoT Forensics – You still need these skills!

2023-08-22T17:45:09-06:00August 20th, 2023|Tags: , , , , , , , , , , |

      H-11 Digital Forensics has been providing certified training on JTAG, ISP, Chip-Off and Rusolut's VNR advanced data recover techniques. We invite you to join us in taking one of H-11's certified courses. JTAG, which stands for "Joint [...]

Digital Intelligence’s FRED-C Workgroup Server – the right fit for your Lab

2023-08-18T11:27:17-06:00August 18th, 2023|Tags: , , , , , , , |

FRED-C Workgroup Server Digital Intelligence (DI) continues to lead the way for Digital Forensic Servers, Workstations, Laptops, and Mini Computers. For years DI has provided a full scalable server called the FRED-C. Now you can get a mid-size device called [...]

VeraKey device imaging and Signed Mac Agents with Jamf in Magnet AXIOM Cyber 7.4

2023-08-15T12:08:18-06:00August 15th, 2023|Tags: , , , , , , , , , , |

This release introduces a new signed Mac agent to help ensure you can quickly and reliably collect from remote Mac endpoints without triggering Apple’s Transparency, Consent, and Control (TCC) prompt. This release also adds a new viewer that lets you [...]

Security Marshal solutions arrest Ransomware, Malicious Code, Malware, Phishing Attacks, and provides DLP

2023-08-19T13:52:52-06:00August 12th, 2023|Tags: , , , , , , , , , , |

Security Marshal is a leading provider of advanced Email Security and Cyber Solutions, dedicated to safeguarding your organization against sophisticated email attacks and cyber threats. Our global team of experts offers tailored solutions to effectively address and mitigate these evolving [...]

Go to Top