Skip to content

Wiping a Working Drive: Tips and Tricks

By Mike Cobb, Director of Engineering If you’re upping your digital game by replacing a working computer or hard drive with something newer, whether for business or personal purposes, chances are you will be selling, donating or passing down your older computer and it will be used by someone else…

Digital Forensic Process—Presentation

By John Ahearne, Forensic Analyst   This article is part of a series that delves into each step of the digital forensic process. If you missed one of the previous articles, you can read them at the links below: Introduction Identification Preservation/Collection Analysis In this article, we outline certain digital…

Digital Forensic Process—Analysis

By John Ahearne, Forensic Analyst This article is part of a series that delves into each step of the digital forensic process. If you missed one of the previous articles, you can read them at the links below: Introduction Identification Preservation/Collection Analysis of Digital Evidence Forensic digital analysis is the…

Press Release: DriveSavers Meets New SSAE 18 Security Standards

Leader in data recovery, eDiscovery, digital forensics addresses SSAE 18 SOC2 Type II guidelines. DriveSavers, the worldwide leader in data recovery, eDiscovery and digital forensics, announces compliance with new data security requirements added to Standards Organization Controls (SOC) 1 and 2. The American Institute of Certified Public Accountants (AICPA) recently…

Legal Technology Moves Into “IoT” Territory

By Bob Mehr, Sr. Legal Services Advisor Technology is changing today’s legal landscape as courts grapple with a wave of electronic evidence coming from places and things that connect to the Internet. This new evidence is from sources we never imagined would be admissible, including smartphones, doorbells, virtual assistants and…

Petya/ExPetr was Data Killer, Not Ransomware

By Michael Hall, Chief Information Security Officer The malware attack that started in Eastern Europe in late June and quickly spread around the globe looks like it was not a ransom attack at all, but an all-out effort to destroy data, according to a security company that examined the program’s…

Ransomware Takes a New Turn—How WannaCry was Different

By Michael Hall, Chief Information Security Officer Last month, the ransomware known as WannaCry spread through the world at an astonishing rate, attacking hundreds of thousands of computers literally overnight and holding their data for ransom. In 2016, ransomware cost its victims approximately $1 billion. That’s $1 billion for all…

Back To Top
Search