コンテンツへスキップ

Wiping a Working Drive: Tips and Tricks

By Mike Cobb, Director of Engineering If you’re upping your digital game by replacing a working computer or hard drive with something newer, whether for business or personal purposes, chances are you will be selling, donating or passing down your older computer and it will be used by someone else…

Digital Forensic Process—Presentation

By John Ahearne, Forensic Analyst   This article is part of a series that delves into each step of the digital forensic process. If you missed one of the previous articles, you can read them at the links below: Introduction Identification Preservation/Collection Analysis In this article, we outline certain digital…

Digital Forensic Process—Analysis

By John Ahearne, Forensic Analyst This article is part of a series that delves into each step of the digital forensic process. If you missed one of the previous articles, you can read them at the links below: Introduction Identification Preservation/Collection Analysis of Digital Evidence Forensic digital analysis is the…

Legal Technology Moves Into “IoT” Territory

By Bob Mehr, Sr. Legal Services Advisor Technology is changing today’s legal landscape as courts grapple with a wave of electronic evidence coming from places and things that connect to the Internet. This new evidence is from sources we never imagined would be admissible, including smartphones, doorbells, virtual assistants and…

Petya/ExPetr was Data Killer, Not Ransomware

By Michael Hall, Chief Information Security Officer The malware attack that started in Eastern Europe in late June and quickly spread around the globe looks like it was not a ransom attack at all, but an all-out effort to destroy data, according to a security company that examined the program’s…

このページのトップへ
検索