Digital Forensics

  • Most Topular Stories

  • Mobe encryption guru Charles Brookson picks up OBE from the Queen Secure Hunter

    Secure Hunter Anti-Malware » Secure Hunter Blog
    shadmin
    27 Jun 2015 | 5:51 am
    Gong for steering engineers through call crypto algos Charles Brookson – the man behind the encryption algorithms in GSM mobile networks – has collected his OBE from the Queen.… The Register – Security Secure Hunter Anti -Malware The post Mobe encryption guru Charles Brookson picks up OBE from the Queen Secure Hunter appeared first on Secure Hunter Anti-Malware.
  • Computer Forensic Expert: Specialist and Investigator

    Elvidence | Computer Forensics
    admin
    25 Jun 2015 | 7:48 am
    In the modern world we’re constantly being bombarded with news of data security breaches and lost data. It’s no surprise then that businesses are increasingly calling on the services of a Computer Forensic specialist to investigate problems. This isn’t only related to cyber crime, a Computer Forensic Expert can be of help with many day-to-day issues like employee misuse of equipment or data leakage from within an organisation. Just What is a Computer Forensic Investigation? A Computer Forensic Investigator is heavily reliant on his or her own knowledge, experience, expertise, diligence,…
  • Redefining Breach Recovery

    TaoSecurity
    Richard Bejtlich
    13 Jun 2015 | 1:56 pm
    For too long, the definition of "breach recovery" has focused on returning information systems to a trustworthy state. The purpose of an incident response operation was to scope the extent of a compromise, remove the intruder if still present, and return the business information systems to pre-breach status. This is completely acceptable from the point of view of the computing architecture.During the last ten years we have witnessed an evolution in thinking about the likelihood of breaches. When I published my first book in 2004, critics complained that my "assumption of breach" paradigm was…
  • Hunting, and Knowing What To Hunt For

    Windows Incident Response
    Harlan Carvey
    22 Jun 2015 | 3:04 pm
    Like many others of my generation, when I was a kid I'd go and play outside for hours and hours.  Sometimes, while running through the woods, I'd see trash...but seeing it often, I wouldn't think much of it.  Sometimes it was a tire in the creek, and other times it might be bottles or cigarette butts in a small cluster. When I went through my initial military training, we spent a lot of time in the outdoors, but during the first 6 months, there was no real "this is what to look for training".  It wasn't until a couple of years later, when I returned to be an instructor that the…
  • "Detecting Shellcode Hidden in Malicious Files"

    SANS Digital Forensics and Incident Response Blog
    Adam Kramer
    28 Jun 2015 | 12:49 am
    A challenge both reverse engineers and automated sandboxes have in common is identifying whether a particular file is malicious or not. This is especially true if the malicious aspects are obfuscated and only triggered under very specific circumstances.There are a number of techniques available to try and identify embedded shellcode, for example searching for patterns (NOP sleds, GetEIP etc), however as attackers update their methods to overcome our protections it becomes more difficult to find the code without having the exact version of the vulnerable software targeted, and allowing the…
  • add this feed to my.Alltop

    SANS Digital Forensics and Incident Response Blog

  • "Detecting Shellcode Hidden in Malicious Files"

    Adam Kramer
    28 Jun 2015 | 12:49 am
    A challenge both reverse engineers and automated sandboxes have in common is identifying whether a particular file is malicious or not. This is especially true if the malicious aspects are obfuscated and only triggered under very specific circumstances.There are a number of techniques available to try and identify embedded shellcode, for example searching for patterns (NOP sleds, GetEIP etc), however as attackers update their methods to overcome our protections it becomes more difficult to find the code without having the exact version of the vulnerable software targeted, and allowing the…
  • "DFIR Hero -- Cindy Murphy Interview"

    Rob Lee
    22 Jun 2015 | 3:28 am
    Cindy Murphyis teaching our Advanced Smartphone Forensics Course in SANS Boston in August 2015. Sign up now to take this course with Cindy. We interviewed Cindy so you can get to know her a bit better. Cindy's real world experience working in law enforcement and cyber security communities combined with her unending knowledge of smartphone forensics (and almost everything else) makes her one of the best and most sought after speakers in the entire ...
  • "How to Install SIFT Workstation and REMnux on the Same Forensics System"

    Lenny Zeltser
    12 Jun 2015 | 7:52 pm
    Combine SIFT Workstation and REMnux on a single system to create a supercharged Linux toolkit for digital forensics and incident response tasks. Here's how.
  • "New Windows Forensics Evidence of Poster Released"

    Rob Lee
    3 Jun 2015 | 9:10 pm
    Link for new poster ->http://dfir.to/GET-FREE-DFIR-POSTERThe "Evidence of..." categories were originally created by SANS Digital Forensics and Incidence Response faculty for the SANS course FOR408: Windows Forensics. The categories map a specific artifact to the analysis questions that it will help to answer. Use this poster as a cheat-sheet to help you remember where you can discover key Windows artifacts for computer intrusion, intellectual property theft, and other common cyber crime investigations.Proper digital forensic and incident response analysis is essential to…
  • "ESE Databases are Dirty!"

    Chad Tilbury
    2 Jun 2015 | 7:48 pm
    With the release of Internet Explorer 10, Microsoft made a radical departure from the way previous browser artifacts were stored. The perennial Index.dat records were replaced with a centralized meta-data store for the browser using the proven "JET Blue" Extensible Storage Engine (ESE) database format. While many forensic examiners have remained blissfully unaware of the ESE format, it has been increasingly used throughout Microsoft products for Exchange, NTDS.DIT, the Windows search database, Windows Live Messenger contacts, and Internet Explorer (IE). With the introduction of an…
 
  • add this feed to my.Alltop

    Windows Incident Response

  • The Blue Team Myth

    Harlan Carvey
    23 Jun 2015 | 6:05 pm
    The 2015 M-Trends Report states that the median number of days that threat groups were present in a victim's network before detection was 205 days, which is down 24 days from 2013.  But that's the median number of days...the longest persistence was 2,982 days.  That's over 8 years.  The report also states that 69% of organizations were informed of the breach by an external entity.The 2015 TrustWave Global Security Report indicates that 81% of companies did not detect breaches on their own, and that the median length of time it took to detect a breach was 86 days.What…
  • Hunting, and Knowing What To Hunt For

    Harlan Carvey
    22 Jun 2015 | 3:04 pm
    Like many others of my generation, when I was a kid I'd go and play outside for hours and hours.  Sometimes, while running through the woods, I'd see trash...but seeing it often, I wouldn't think much of it.  Sometimes it was a tire in the creek, and other times it might be bottles or cigarette butts in a small cluster. When I went through my initial military training, we spent a lot of time in the outdoors, but during the first 6 months, there was no real "this is what to look for training".  It wasn't until a couple of years later, when I returned to be an instructor that the…
  • RegRipper plugin update

    Harlan Carvey
    11 Jun 2015 | 8:09 am
    I just pushed out an update to the appcompatcache.pl plugin, and committed it to the Github archive.  The update was based on a request I'd received to make the output of the tool a bit more manageable, and that was right along the lines of something I'd been thinking about doing for some time, anyway.In short, the update simply puts the output for each entry on a single line, with the app path and name first, then the date, then other data (that's specific to 32-bit XP, actually), and finally, the executed flag.  Each segment is separated by two spaces.So, what does this mean?
  • Links

    Harlan Carvey
    7 Jun 2015 | 4:36 am
    SANS DFIR PosterIf you haven't heard, the new SANS DFIR "Evidence of..." poster is available.  I can see looking at the second page of the poster that they've added some items of interest that have been talked about recently.  For example, under "Browser Usage", I see mention of Mari's Google Analytics Cookies, and under "Program Execution", I see a reference to the AmCache.hve and the RecentFileCache.bcf files.What's New in Windows 10Speaking of "evidence of...", one question I see quite often is, "..what's new in Windows {insert newest version number}?"  Some folks…
  • Detecting Lateral Movement

    Harlan Carvey
    28 May 2015 | 5:07 am
    Almost two years ago, I posted this article that addressed how to track lateral movement within an infrastructure.  At the time, I'd been using this information successfully during engagements, and I still use it today.This morning, I saw this video from Rapid7, and I thought that Mike did a great job with the presentation.  Mike made some very good points during his presentation.  For example, "SMB" is native to a Windows infrastructure, and with the right credentials, an adversary can go just about anywhere they please.There were some things missing in the presentation,…
  • add this feed to my.Alltop

    TaoSecurity

  • My Prediction for Top Gun 2 Plot

    Richard Bejtlich
    30 Jun 2015 | 8:01 am
    We've known for about a year that Tom Cruise is returning to his iconic "Maverick" role from Top Gun, and that drone warfare would be involved. A few days ago we heard a few more details in this Collider story:[Producer David Ellison]: There is an amazing role for Maverick in the movie and there is no Top Gun without Maverick, and it is going to be Maverick playing Maverick. It is I don’t think what people are going to expect, and we are very, very hopeful that we get to make the movie very soon. But like all things, it all comes down to the script, and Justin is writing as we…
  • Hearing Witness Doesn't Understand CDM

    Richard Bejtlich
    27 Jun 2015 | 8:50 am
    This post is a follow up to this post on CDM. Since that post I have been watching hearings on the OPM breach.On Wednesday 24 June a Subcommittee of the House Committee on Homeland Security held a hearing titled DHS’ Efforts to Secure .Gov.A second panel (starts in the Webcast around 2 hours 20 minutes) featured Dr. Daniel M. Gerstein, a former DHS official now with RAND, as its sole witness.During his opening statement, and in his written testimony, he made the following comments:"The two foundational programs of DHS’s cybersecurity program are EINSTEIN (also…
  • The Tragedy of the Bloomberg Code Issue

    Richard Bejtlich
    20 Jun 2015 | 6:13 am
    Last week I Tweeted about the Bloomberg "code" issue. I said I didn't know how to think about it. The issue is a 28,000+ word document, enough to qualify as a book, that's been covered by news outlets like the Huffington Post.I approached the document with an open mind. When I opened my mail box last week, I didn't expect to get a 112 page magazine devoted to explaining the importance of software to non-technical people. It was a welcome surprise.This morning I decided to try to read some of the issue. (It's been a busy week.) I opened the table of contents, shown at left. It took me a…
  • Air Force Enlisted Ratings Remain Dysfunctional

    Richard Bejtlich
    19 Jun 2015 | 5:08 pm
    I just read Firewall 5s are history: Quotas for top ratings announced in Air Force Times. It describes an effort to eliminate the so-called "firewall 5" policy with a new "forced distribution" approach:The Air Force's old enlisted promotion system was heavily criticized by airmen for out-of-control grade inflation that came with its five-point numerical rating system. There were no limits on how many airmen could get the maximum: five out of five points [aka "firewall 5"]. As a result nearly everyone got a 5 rating.As more and more raters gave their airmen 5s on their EPR [ Enlisted…
  • Redefining Breach Recovery

    Richard Bejtlich
    13 Jun 2015 | 1:56 pm
    For too long, the definition of "breach recovery" has focused on returning information systems to a trustworthy state. The purpose of an incident response operation was to scope the extent of a compromise, remove the intruder if still present, and return the business information systems to pre-breach status. This is completely acceptable from the point of view of the computing architecture.During the last ten years we have witnessed an evolution in thinking about the likelihood of breaches. When I published my first book in 2004, critics complained that my "assumption of breach" paradigm was…
 
  • add this feed to my.Alltop

    digital forensics - Google News

  • Computer forensics to examine son's claims that it was dad's child porn, not his - Ars Technica

    30 Jun 2015 | 11:10 am
    Ars TechnicaComputer forensics to examine son's claims that it was dad's child porn, not hisArs TechnicaPetitioner's ineffective assistance of counsel claim is based, in part, on the allegation that trial counsel failed to secure an independent forensic expert to analyze the computer media at issue. It is undisputed that Petitioner's trial counsel did and more »
  • Vyapam Scam : Digvijaya Files Petition in SC for CBI Probe - Odisha Samaya

    30 Jun 2015 | 8:03 am
    FirstpostVyapam Scam : Digvijaya Files Petition in SC for CBI ProbeOdisha SamayaSeeking to quash both the SIT report and the April 24 High Court order, Mr, Singh said the report entirely banked on the demonstration given by STF, which is both “ill-equipped and ill-trained to handle the nuances of digital forensics”. Mr. Singh said CBI must probe mysterious deaths in Vyapam case WhistleblowerJagran Postall 73 news articles »
  • What a great idea: NFL looking for someone to find stuff in cell phones - NBCSports.com

    29 Jun 2015 | 11:59 am
    NBCSports.comWhat a great idea: NFL looking for someone to find stuff in cell phonesNBCSports.comThe job posting for a “Director of Digital Forensic Investigations” sounds like something that might have come in handy while they were shoveling money Ted Wells' way during the #DeflateGate investigation. The job posting says the individual: “is The NFL is hiring someone to be its Director of InvestigationsNew York Daily Newsall 7 news articles »
  • Digital Forensics Certification Board Names Gregg Gunsch as the Latest DFCB ... - Digital Journal

    29 Jun 2015 | 5:06 am
    Digital Forensics Certification Board Names Gregg Gunsch as the Latest DFCB Digital JournalEL DORADO HILLS, CA--(Marketwired - Jun 29, 2015) - The Digital Forensics Certification Board (DFCB), an independent certifications organization for digital evidence examiners, today honors one of its members with the DFCB Fellow certification. Dr and more »
  • Research and Markets: Forensics Products and Services Market in the US 2015 ... - Business Wire (press release)

    25 Jun 2015 | 9:20 am
    Research and Markets: Forensics Products and Services Market in the US 2015 Business Wire (press release)Commenting on the report, an analyst from The author's team said: One key trend emerging in the market is the popularity of digital Forensics. Digital Forensics deal with the analysis of information stored on electronic and digital devices for evidence and more »
  • add this feed to my.Alltop

    Checkmate

  • Security Review of Microsoft DirectAccess implementation

    Vinesh Redkar
    30 Jun 2015 | 12:12 am
    This article presents the key risks with DirectAccess and how to audit them. Let’s begin by first understanding the DirectAccess technology. Introduction of DirectAccess From the Wikipedia definition DirectAccess, also known as Unified Remote Access, is a VPN-like technology that provides intranet connectivity to client computers when they are connected to the Internet. Direct Access Read More... The post Security Review of Microsoft DirectAccess implementation appeared first on Checkmate.
  • Server Side Request Forgery (SSRF)

    Nilesh Sapariya
    15 Apr 2015 | 4:33 am
    Introduction Is your server protected against port scanning?  The general answer will be “Yes, I have a firewall which restricts access to internal servers from the Internet.” What if I tell you I can still scan the ports on your server and your firewall wouldn’t know about it! If the web application running on a Read More... The post Server Side Request Forgery (SSRF) appeared first on Checkmate.
  • PCI DSS Penetration Testing Guidance

    Wasim Halani
    10 Apr 2015 | 5:40 am
    The Payment Card Industry Security Standards Council recently released their updated Information Supplement: Penetration Testing Guidance. The guidance document was last published in 2008 under the heading ‘Requirement 11.3 Penetration Testing’ The updated document marks a major difference in the approach taken by the PCI Council to clarify and educate stakeholders about the standard’s requirements Read More... The post PCI DSS Penetration Testing Guidance appeared first on Checkmate.
  • Anatomy of a Credit Card Stealing POS Malware

    Monika Kachroo
    2 Mar 2015 | 10:13 pm
    INTRODUCTION Point-of-sale (POS) is the place where a retail transaction is completed. It is the point at which a customer makes a payment to the merchant in exchange for goods or services. Majority of retail POS systems also include a debit/credit card reader. POINT-OF-SALE INTRUSIONS What is it? When attackers compromise the computers and servers Read More... The post Anatomy of a Credit Card Stealing POS Malware appeared first on Checkmate.
  • Cuckoo Sandbox 102: State-of-the-art Malware Analysis

    Sumit Shrivastava
    2 Mar 2015 | 12:55 am
    Introduction Cuckoo Sandbox is an Open Source Automated Malware Analysis system that has been gaining more and more attention in recent years. The fact that Cuckoo is fully open source makes it a very interesting system for those that want to modify its internals, experiment with automated malware analysis, and setup scalable and cheap malware Read More... The post Cuckoo Sandbox 102: State-of-the-art Malware Analysis appeared first on Checkmate.
 
  • add this feed to my.Alltop

    Forensic Focus

  • Forensic Browser for SQLite - Creating a Custom Report

    30 Jun 2015 | 10:03 am
    In this article I will take you step by step through the process of creating a custom, but simple, report on a Kik messenger database using the Forensic Browser for SQLite. As we work through the process we will chose which columns we think will be useful in our report and modify our report by creating simple visual SQL joins on different tables displaying numerics as timezone adjusted dates and importing pictures saved in external binary PLists. Read more here
  • Guidance Software EnCase® Wins 2015 SC Awards Europe for Best Computer Forensics

    30 Jun 2015 | 7:03 am
    Guidance Software, Inc. (GUID) has had its EnCase® software named "Best Computer Forensics Solution" at the 2015 SC Awards Europe Awards. Each year, hundreds of products are entered in the Excellence Awards: Threat Solutions categories. Each product is judged by a panel representing a cross-section of SC Magazine readership, which is comprised of large, medium and small enterprises from all major vertical markets including financial services, healthcare, government, retail, education and other sectors. This recognition was the latest in a series of awards that Guidance Software has recently…
  • Solution for the Jammed Motor on Hard Drives

    30 Jun 2015 | 2:12 am
    Introduction of the fluid bearings hasn't completely eliminated all possibilities for the motor failures during HDD operation. Currently, the biggest problem in this area is the jammed spindle in the bearing housing. This defect occurs mostly due to shocks or falls of HDD during the operation. Hard drives from Seagate 7200.11 and 7200.10 families are especially prone to this type of malfunction. HddSurgery, as a company which develops tools and "know-how" solutions in data recovery, worked on solving the HDD spindle motor problem for almost two years.
  • Webinar: Analyzing Evidence From Mobile Devices, Including Hidden/Deleted Data

    26 Jun 2015 | 2:18 am
    A recording of the webinar "Analyzing Evidence From Mobile Devices, Including Hidden and Deleted Data" is now online and available to view here. Join the forum discussion here. View the webinar on YouTube here. Read a full transcript here.
  • Major Cybercrime Ring Dismantled By Joint Investigation Team

    25 Jun 2015 | 7:13 am
    A joint investigation team consisting of investigators and judicial authorities from six different European countries, supported by Europol and Eurojust, has taken down a major cybercriminal group during a coordinated action in Ukraine. With on-the-spot support from Europol, Austrian and Belgian law enforcement and judicial authorities, the action in Ukraine on 18 and 19 June resulted in the arrest of five suspects, eight house searches in four different cities, and the seizure of computer equipment and other devices for further forensic examination. The aim of this JIT was to target…
  • add this feed to my.Alltop

    (ISC)2 Blog

  • A Simpler Way to Research Regulatory Requirements

    (ISC)² Management
    30 Jun 2015 | 9:40 am
    Commonplace to information security professionals, regulatory compliance does not necessarily guarantee security. However, in a world rife with perpetual breaches and data loss, we hear more and more about the importance of regulatory compliance and IT governance, risk management and compliance (or GRC for short). For those folks who are required to abide by regulations such as HIPAA, SOX or PCI (especially those who fall under multiple regulations), maintaining compliance can be cumbersome. These requirements, in addition to normal information security duties, can be simply overwhelming for…
  • CSSIA - Closing the Gap in Cybersecurity Education for Nearly 30 Years

    (ISC)² Management
    25 Jun 2015 | 1:07 pm
    To provide insight into the positive strides the (ISC)2 Global Academic Program (GAP) and its member schools are making in filling the pipeline for qualified professionals, we’re going to highlight a different GAP school every other month. The National Center for Systems Security and Information Assurance (CSSIA), one of the country’s first comprehensive Centers for Advanced Technology Education, became a GAP member school in 2014. CSSIA has four goals focused on innovation in cybersecurity education: Expanding and enhancing cybersecurity curriculum labs, skills events and competitions…
  • 5 Apps Children are Using That Parents Should Be Aware of During the School Break

    (ISC)² Management
    17 Jun 2015 | 12:13 pm
    Facebook, Twitter, Tumblr, Down, Instagram, Snapchat. It seems like every day there’s a new app available for children to connect with friends and strangers online. According to McAfee’s Digital Deception Study 2013, only 20 percent of parents say they know how to find out what their child is doing online. And nearly 70 percent of the study’s respondents (ages 10-23) take some measure to hide their online behavior from their parents. With so many new apps and social platforms springing up, it can be difficult for parents to monitor their children’s online activities. It can be…
  • CISSP: A Global Force at 100,000 Strong

    (ISC)² Management
    29 May 2015 | 9:10 am
    Whenever we look toward the future, we have to first look back and think about where we came from. Back in 1989, (ISC)² was established by a handful of passionate volunteers who wanted to create a set of standards for a newer concept, not yet a full-fledged career field, called information security. In the minds of these volunteers, having the initial 500 applicants sign up to take the Certified Information Systems Security Professional (CISSP) was considered quite a success. Little did they imagine that 26 years later, not only would those 500 applicants grow to a cadre of 100,000 CISSP…
  • Comments from (ISC)² Leadership on CareFirst Breach

    (ISC)² Management
    22 May 2015 | 9:53 am
    If this breach follows the pattern of other health IT breaches as of late, then this type of intrusion at CareFirst wouldn’t be considered particularly difficult for an advanced team of malicious actors.  The main objective would be to steal a set or multiple sets of user credentials.  A juicy target would be an administrator or super user with high levels of access.  This could be done using malware from a spear phishing attack or a watering hole attack.  From there, the bad actors would actually be using legitimate user credentials to steal the data for which they…
  • add this feed to my.Alltop

    Secure Hunter Anti-Malware » Secure Hunter Blog

  • That shot you heard? SSLv3 is now DEAD Secure Hunter

    shadmin
    28 Jun 2015 | 5:50 pm
    It’s joined the choir invisible We really, really, really mean it this time: take SSL3 and bury it.… The Register – Security Secure Hunter Anti -Malware The post That shot you heard? SSLv3 is now DEAD Secure Hunter appeared first on Secure Hunter Anti-Malware.
  • Vegan eats BeEf, gets hooked Secure Hunter

    shadmin
    28 Jun 2015 | 5:50 am
    Bad taste still lingers Botnet slaughterer Brian Wallace has created a module to detect when attackers are using the popular browser-busting BeEF hacking framework.… The Register – Security Secure Hunter Anti -Malware The post Vegan eats BeEf, gets hooked Secure Hunter appeared first on Secure Hunter Anti-Malware.
  • Rivalry heats up as VXers bake Fobber crypto clobber Secure Hunter

    shadmin
    27 Jun 2015 | 5:53 pm
    Hop, skip, and headache. A malware development squad is so determined to thwart meddling white hat researchers that it has produced a trojan riddled with obfuscation techniques and neurotic encryption.… The Register – Security Secure Hunter Anti -Malware The post Rivalry heats up as VXers bake Fobber crypto clobber Secure Hunter appeared first on Secure Hunter Anti-Malware.
  • Mobe encryption guru Charles Brookson picks up OBE from the Queen Secure Hunter

    shadmin
    27 Jun 2015 | 5:51 am
    Gong for steering engineers through call crypto algos Charles Brookson – the man behind the encryption algorithms in GSM mobile networks – has collected his OBE from the Queen.… The Register – Security Secure Hunter Anti -Malware The post Mobe encryption guru Charles Brookson picks up OBE from the Queen Secure Hunter appeared first on Secure Hunter Anti-Malware.
  • OPM data breach: Looking at you, China! National Intelligence head stares out Beijing Secure Hunter

    shadmin
    26 Jun 2015 | 5:50 pm
    You’ve gotta hand it to ’em, says Clapper James Clapper, Director of the US’ National Intelligence body, has suggested Beijing is behind the successful attacks on the Office of Personnel Management (OPM), which resulted in the theft of millions of federal employees’ (including intelligence workers) highly sensitive biographies.… The Register – Security Secure Hunter Anti -Malware The post OPM data breach: Looking at you, China! National Intelligence head stares out Beijing Secure Hunter appeared first on Secure Hunter Anti-Malware.
 
  • add this feed to my.Alltop

    Elvidence | Computer Forensics

  • Computer Forensic Expert: Specialist and Investigator

    admin
    25 Jun 2015 | 7:48 am
    In the modern world we’re constantly being bombarded with news of data security breaches and lost data. It’s no surprise then that businesses are increasingly calling on the services of a Computer Forensic specialist to investigate problems. This isn’t only related to cyber crime, a Computer Forensic Expert can be of help with many day-to-day issues like employee misuse of equipment or data leakage from within an organisation. Just What is a Computer Forensic Investigation? A Computer Forensic Investigator is heavily reliant on his or her own knowledge, experience, expertise, diligence,…
  • Information Security Risks

    admin
    14 May 2015 | 6:02 am
    Digital technologies have touched almost every aspect of our life to some extent. Cloud, big data, mobile computing devices and social networking have profoundly changed the dynamics of the modern business. These technologies help us do our work more efficiently, enable businesses connect with genuine customers and deliver better, more personalised products or services. For organisations, the ability to quickly adapt to innovations and implement digital technology that enhances their productivity is a must in the current economic climate. At the same time organisations are being constantly…
  • Eavesdropping in the 21st Century

    admin
    28 Apr 2015 | 2:25 am
    Bugging, you might think, is the stuff of 1960s spy movies; microphones hidden in desk lamps and reel-to-reel tape recorders slowly turning in the next room. In fact it’s still very much a part of the modern world and our reliance on computers, mobile phones and other digital technology leaves us more open than ever to various types of eavesdropping. Whilst there are companies around that will help you detect conventional bugs like concealed microphones and hidden cameras, tracking down cyber-snooping is a much more specialist task. It involves technical surveillance countermeasures (TSCM)…
  • The Other Digital Divide

    admin
    6 Mar 2015 | 5:00 am
    We often hear public speakers talk about the digital divide. Usually they mean the sections of society that don’t have access to the Internet and therefore don’t get the best access to products and services via technology or are unable to find the best deals online. But there’s another digital divide too, between people who understand the technology they’re using and those who know just enough to get by. The latter group are able to use computers and mobile devices to carry out their daily tasks, but are likely to panic when something changes or doesn’t work as they expect. Digital…
  • Computer Forensic Services Explained

    admin
    13 Feb 2015 | 7:35 pm
    Elvidence provides a wide range of computer forensic services, ranging from data collection and analysis to computer hacking investigations and expert witness services. Whilst this type of work is often linked to gathering evidence for court cases it can have many other uses too. Here’s a look at some of what we can do for businesses and individuals. Computer Forensics There’s been a significant rise in the amount of computer and internet related crime in recent years. This is hardly surprising as we increasingly rely on computers and the internet to carry out transactions and…
  • add this feed to my.Alltop

    Kessler International | Forensic Accounting, IP Protection, Cell Phone Forensics, Computer Forensics | RSS Feed

  • Business Intelligence: It Pays to Know More

    ki-admin
    30 Jun 2015 | 11:34 am
    It’s not easy getting a business started, and it’s even more difficult maintaining success. The statistics are not kind to new businesses, and in fact, most fail within a single year. If you’re having trouble building your business in a competitive market, you may want to consider consulting an investigation firm to provide business intelligence solutions. Business Intelligence solutions can provide you with the insight needed to better understand your market. Intelligence analysts are capable of discreetly and covertly obtaining corporate strategies from the competition to provide you…
  • What Happened to My Data?

    ki-admin
    26 Jun 2015 | 10:38 am
    It’s a truly awful feeling when you lose the information on your computer or cell phone. It’s an empty feeling of despair that sits right in your stomach. You may have just written your college thesis or sent an important email or text message. Whatever the digital data may have been, there’s a quiet moment of desperation when you realize it’s lost. There are a number of events that may have caused the information to seemingly disappear. Viruses Perhaps this is the worst case scenario. They come in all shapes and sizes. Maybe you were unfortunate enough to respond to one of those…
  • Amtrak Engineer Wasn’t On Phone During Philly Crash: NTSB

    ki-admin
    18 Jun 2015 | 7:12 am
    By Joe Van Acker New York (Law360) — The engineer operating Amtrak train number 188 when it derailed near Philadelphia in May doesn’t appear to have been distracted by his cellphone based on preliminary results of an ongoing forensic investigation, the U.S. National Transportation Safety Board said Wednesday. No calls, texts or data usage took place on engineer Brandon Bostian’s phone while the train traveled toward New York, and Amtrak’s records indicate that he didn’t access the train’s Wi-Fi network either, but it’s still unknown whether the phone was off or in airplane…
  • Kessler Named Number One In Corporate Investigation Services 2015

    ki-admin
    16 Jun 2015 | 7:09 am
    Kessler International is the winner in the Acquisition International’s 2015 M&A Awards! Kessler International has just been named number one in the Sustained Excellence in Corporate Investigation Services – USA category, for the second year in a row. Kessler International also took home the award for Best for Forensic Accounting – USA. This is another highly sought after accomplishment in the competitive world of forensic accounting and we couldn’t be more proud of this achievement. Kessler International is the Winner in the 2015 M&A Awards! The post Kessler Named Number One…
  • The Kessler Difference

    ki-admin
    15 Jun 2015 | 10:53 am
    The Kessler Difference Kessler International is a fully licensed private investigative firm carrying 15 active licenses in different states including two in New York and California, Illinois, Florida, Arizona, Connecticut, Georgia, Michigan, Missouri, New Jersey, North Carolina, Puerto Rico, Texas and Washington. The Kessler Difference – PDF Brochure The post The Kessler Difference appeared first on Kessler International | Forensic Accounting, IP Protection, Cell Phone Forensics, Computer Forensics.
Log in