Digital Forensics

  • Most Topular Stories

  • "Running Malware Analysis Apps as Docker Containers"

    SANS Digital Forensics and Incident Response Blog
    Lenny Zeltser
    9 Dec 2014 | 7:23 pm
    A new REMnux project initiative provides Docker images of Linux applications useful for malware analysis to offer investigators easier access to malware forensics tools. Docker is a platform for packaging, running and managing applications as "containers," as a lightweight alternative to full virtualization. Several application images are available as of this writing, and you can contribute your own as a way of experimenting with Docker and sharing with the community.
  • 10 Years of Blogging

    Windows Incident Response
    Harlan Carvey
    8 Dec 2014 | 3:23 am
    That's right...my first blog post was ten years ago today.  Wow. Over the passed ten years, some things have changed, and others haven't. As the year comes to a close, don't forget about the WRF 2/e Contest.
  • Nothing Is Perfectly Secure

    TaoSecurity
    Richard Bejtlich
    5 Dec 2014 | 1:59 pm
    Recently a blog reader asked to enlist my help. He said his colleagues have been arguing in favor of building perfectly secure systems. He replied that you still need the capability to detect and respond to intrusions. The reader wanted to know my thoughts.I believe that building perfectly secure systems is impossible. No one has ever been able to do it, and no one ever will.Preventing intrusions is a laudable goal, but I think security is only as sound as one's ability to validate that the system is trustworthy. Trusted != trustworthy.Even if you only wanted to make sure your "secure"…
  • Review: Python Forensics - Help Net Security

    digital forensics - Google News
    18 Dec 2014 | 12:22 am
    Help Net SecurityReview: Python ForensicsHelp Net SecurityChet Hosmer is a Founder and Chief Scientist of WetStone Technologies. Chet has been researching and developing technology and training surrounding digital investigation, forensics, data hiding, steganography and cyber security for over two decades.
  • Police, digital forensics and the case against encryption

    Forensic Focus
    17 Dec 2014 | 4:17 am
    Mark Stokes, head of digital and electronics forensics services at the Met Police, keynote speaker at the (ISC)² EMEA Congress in London on Tuesday, detailed the techniques and technologies used to forensically investigate criminals who, he says, are increasingly reliant on smartphones, cloud services, hard disk drives (HDDs) and solid-state drives (SSDs) to hide their activities or crimes. This deluge of data is becoming hard to investigate, says Stokes, who cited the increasing number of devices used(terrorists are said to have up to six mobile phones each on average), and this is…
  • add this feed to my.Alltop

    SANS Digital Forensics and Incident Response Blog

  • "Running Malware Analysis Apps as Docker Containers"

    Lenny Zeltser
    9 Dec 2014 | 7:23 pm
    A new REMnux project initiative provides Docker images of Linux applications useful for malware analysis to offer investigators easier access to malware forensics tools. Docker is a platform for packaging, running and managing applications as "containers," as a lightweight alternative to full virtualization. Several application images are available as of this writing, and you can contribute your own as a way of experimenting with Docker and sharing with the community.
  • "DFIR Monterey 2015 Network Forensics Challenge Released"

    SANS Institute
    5 Dec 2014 | 1:37 am
    DFIR Monterey 2015Join us at DFIR Monterey 2015 - a Reverse Engineering Digital Forensics and Incident Response Education (REDFIRE) Event.This unique Digital Forensics and Incident Response (DFIR) event brings our most popular forensics courses, instructors, and bonus seminars together in one place to offer one of SANS most comprehensive DFIR training experiences. This is a must-attend event for you and your team as our leading experts focus on building the DFIR skills that will take you to that next level.Network Forensic ChallengeThe objective of the
  • "How to Track Your Malware Analysis Findings"

    Anuj Soni
    30 Nov 2014 | 9:37 pm
    IntroductionThe field of incident response, forensics, and malware analysis is full of thrilling hunts and exciting investigations where you have an opportunity to aggressively pursue the activities of adversaries. While technical acumen certainly supports these efforts, a truly successful execution requires both a well-crafted process and detailed documentation of the journey through that process. Meticulous documentation allows you to easily retrace your analysis flow (particularly important if the work supports any litigation), and it facilitates information sharing so others can benefit…
  • "Kerberos in the Crosshairs: Golden Tickets, Silver Tickets, MITM, and More"

    Mike Pilkington
    23 Nov 2014 | 7:47 pm
    It's been a rough year for Microsoft's Kerberos implementation. The culmination was last week when Microsoft announced critical vulnerability MS14-068. In short, this vulnerability allows any authenticated user to elevate their privileges to domain admin rights. The issues discussed in this article are not directly related this bug. Instead we'll focus on design and implementation weaknesses that can be exploited under certain conditions. MS14-068 is an outright bug which should be patched immediately. If you haven't patched it yet, I suggest you skip this article for now and work that issue…
  • "Protecting Privileged Domain Accounts: Restricted Admin and Protected Users"

    Mike Pilkington
    12 Nov 2014 | 7:51 pm
    It's been a while since I've written about this topic, and in that time, there have been some useful security updates provided by Microsoft, as well as some troubling developments with Microsoft's Kerberos implementation. In order to fully cover these topics, I'm going to split the discussion into two articles. This article will cover specific updates Microsoft has provided to help protect user credentials. I'll follow up next week to discuss the Kerberos issues in depth.As a quick reminder, the major takeaway from my previous articles on this subject are that we can successfully protect our…
 
  • add this feed to my.Alltop

    Windows Incident Response

  • 10 Years of Blogging

    Harlan Carvey
    8 Dec 2014 | 3:23 am
    That's right...my first blog post was ten years ago today.  Wow. Over the passed ten years, some things have changed, and others haven't. As the year comes to a close, don't forget about the WRF 2/e Contest.
  • WRF 2/e Contest

    Harlan Carvey
    23 Oct 2014 | 5:57 am
    I recently posted that Syngress has agreed to publish a second edition of Windows Registry Forensics, and in that post, I mentioned that I wanted to provide those in the community with an opportunity to have input into the content of the book prior to it being published.  I know that it's only been a couple of days since the post was published, but historically, requests like these haven't really panned out.  As such, I wanted to take something of a different approach...at the recommendation of a friend, and stealing a page from the Volatility folks, I'm starting a contest for…
  • RegRipper v2.8 is now on GitHub

    Harlan Carvey
    22 Oct 2014 | 12:53 pm
    RegRipper v2.8 is now available on GitHub.From this point forward, this repository should be considered THE repository for RegRipper version 2.8.  If you want a copy of RegRipper, just click the "Download ZIP" button on the right of the browser window, and save the file...doing so, you'll have the latest-and-greatest set of plugins available. If you have any questions, please feel free to contact me.
  • Windows Event Logs

    Harlan Carvey
    21 Oct 2014 | 4:31 am
    Dan recently tweeted:Most complete forensics-focused Event Log write-ups? DFIRI have no idea what that means.  I'm going to assume that what Dan's looking for is information regarding Event Logs records that have been found useful or valuable to forensic analysts, or potentially could be.EVT vs EVTXWindows XP is no longer supported by Microsoft, but there are still XP and 2003 systems out there, and as such, some of us are still going to need to know the difference between Event Logs (XP, 2003), and Windows Event Logs (Vista+). Besides the binary differences in the records and Event Log…
  • Publishing DFIR Books

    Harlan Carvey
    20 Oct 2014 | 5:45 pm
    I recently received notification that Syngress is interesting in publishing a second edition of Windows Registry Forensics.  I submitted my proposed outline, the reviews of which were apparently favorable enough to warrant a second edition. I've blogged before regarding writing DFIR books, and that effort seems to have fizzed a bit.  I wanted to take the opportunity to give another shot and see if I couldn't resurrect this topic, or a portion of it, just a bit.  So, the purpose of this blog post is two-fold: to set expectations of the upcoming edition, as well as offer…
  • add this feed to my.Alltop

    TaoSecurity

  • Nothing Is Perfectly Secure

    Richard Bejtlich
    5 Dec 2014 | 1:59 pm
    Recently a blog reader asked to enlist my help. He said his colleagues have been arguing in favor of building perfectly secure systems. He replied that you still need the capability to detect and respond to intrusions. The reader wanted to know my thoughts.I believe that building perfectly secure systems is impossible. No one has ever been able to do it, and no one ever will.Preventing intrusions is a laudable goal, but I think security is only as sound as one's ability to validate that the system is trustworthy. Trusted != trustworthy.Even if you only wanted to make sure your "secure"…
  • Bejtlich on Fox Business Discussing Recent Hacks

    Richard Bejtlich
    2 Dec 2014 | 6:04 pm
    I appeared on Fox Business (video) today to discuss a wide variety of hacking topics. It's been a busy week. Liz Claman and David Asman ask for my perspective on who is responsible, why the FBI is warning about destructive malware, how the military should respond, what businesses can do about intrusions, and more. All of these subjects deserve attention, but I tried to say what I could in the time available.For more on these and other topics, don't miss the annual Mandiant year-in-review Webinar, Wednesday at 2 pm ET. Register here. I look forward to joining Kristen Verderame and Kelly…
  • Response to "Can a CISO Serve Jail Time?"

    Richard Bejtlich
    17 Nov 2014 | 8:30 am
    I just read a story titled Can a CISO Serve Jail Time? Having been Chief Security Officer (CSO) of Mandiant prior to the FireEye acquisition, I thought I would share my thoughts on this question.In brief, being a CISO or CSO is a tough job. Attempts to criminalize CSOs would destroy the profession.Security is one of the few roles where global, distributed opponents routinely conduct criminal acts against business operations. Depending on the enterprise, the offenders could be nation state adversaries largely beyond the reach of any party, to include the nation state hosting the…
  • Thank You for the Review and Inclusion in Cybersecurity Canon

    Richard Bejtlich
    10 Nov 2014 | 2:27 pm
    I just read The Cybersecurity Canon: The Practice of Network Security Monitoring at the Palo Alto Networks blog. Rick Howard, their CSO, wrote the post, which marks the inclusion of my fourth book in Palo Alto's Cybersecurity Canon. According to the company's description, the Canon is:a list of must-read books where the content is timeless, genuinely represents an aspect of the community that is true and precise and that, if not read, leaves a hole in a cybersecurity professional’s education that will make the practitioner incomplete.The Canon candidates include both fiction and…
  • We Need More Than Penetration Testing

    Richard Bejtlich
    16 Sep 2014 | 9:47 am
    Last week I read an article titled  People too trusting when it comes to their cybersecurity, experts say by Roy Wenzl of The Wichita Eagle. The following caught my eye and prompted this post:[Connor] Brewer is a 19-year-old sophomore at Butler Community College, a self-described loner and tech geek...Today he’s what technologists call a white-hat hacker, hacking legally for companies that pay to find their own security holes. When Bill Young, Butler’s chief information security officer, went looking for a white-hat hacker, he hired Brewer, though Brewer has yet to complete…
 
  • add this feed to my.Alltop

    digital forensics - Google News

  • Review: Python Forensics - Help Net Security

    18 Dec 2014 | 12:22 am
    Help Net SecurityReview: Python ForensicsHelp Net SecurityChet Hosmer is a Founder and Chief Scientist of WetStone Technologies. Chet has been researching and developing technology and training surrounding digital investigation, forensics, data hiding, steganography and cyber security for over two decades.
  • Tacoma Police Department goes back to school to teach digital crime fighting - MyNorthwest.com

    17 Dec 2014 | 5:23 am
    MyNorthwest.comTacoma Police Department goes back to school to teach digital crime fightingMyNorthwest.comThe Tacoma Police Department is going back to school to teach students at the University of Washington Tacoma how to crack the technology of mobile devices to solve crimes. The new three-course offering in mobile digital forensics gets underway next ...
  • Pending New Jersey Criminal Case Highlights The Need For Clarity On What ... - Mondaq News Alerts (registration)

    12 Dec 2014 | 3:40 am
    Pending New Jersey Criminal Case Highlights The Need For Clarity On What Mondaq News Alerts (registration)DNA evidence is to helping solve biological phenomena what digital forensic evidence is to helping answer questions about matters concerning the digital universe of connectivity that dominates our contemporary way of life. The nature and character of
  • Police, digital forensics and the case against encryption - SC Magazine UK

    11 Dec 2014 | 7:02 am
    SC Magazine UKPolice, digital forensics and the case against encryptionSC Magazine UKMark Stokes, head of digital and electronics forensics services at the Met Police, keynote speaker at the (ISC)² EMEA Congress in London on Tuesday, detailed the techniques and technologies used to forensically investigate criminals who, he says, are ...
  • IT sleuths to upgrade digital forensics skills - Times of India

    9 Dec 2014 | 5:25 pm
    IT sleuths to upgrade digital forensics skillsTimes of IndiaCyber forensics has, over the years, helped the I-T department crack digital data of tax evaders and bring them to book and several successful cases have been highlighted in CBDT's manual. During the year 2013-14, searches conducted by the I-T ...
  • add this feed to my.Alltop

    Forensic Focus

  • Police, digital forensics and the case against encryption

    17 Dec 2014 | 4:17 am
    Mark Stokes, head of digital and electronics forensics services at the Met Police, keynote speaker at the (ISC)² EMEA Congress in London on Tuesday, detailed the techniques and technologies used to forensically investigate criminals who, he says, are increasingly reliant on smartphones, cloud services, hard disk drives (HDDs) and solid-state drives (SSDs) to hide their activities or crimes. This deluge of data is becoming hard to investigate, says Stokes, who cited the increasing number of devices used(terrorists are said to have up to six mobile phones each on average), and this is…
  • Recovering Live System Artifacts with IEF

    16 Dec 2014 | 4:00 am
    The collection of volatile data has become an essential component of a forensic examiner’s processes. While traditional forensic practices have always focused around avoiding any modification of evidence in order to preserve the integrity of the data, this is no longer an option for many investigations. Capturing memory and other live system artifacts is essential to understanding the activity on a system, and can sometimes be the only source of relevant evidence for a case. Many times, I have worked on malware or intrusion cases where the only evidence found on a live system was in memory.
  • Evidence extraction from an Android device using MPE+ dSOLO

    15 Dec 2014 | 5:05 am
    Data Specialist Group has created a self-extraction kit that includes an SD card pre-loaded with AccessData's MPE+ dSOLO Android collection capability. dSOLO gives the end user the ability to extract data onsite from any Android smart phone, utilizing just a preconfigured MicroSD card. This video demonstrates how quick and easy the kit is to use. The MPE+ dSOLO is a built-in feature that allows users to create an extraction profile and then compile that profile to a MicroSD card. Users can then insert the provisioned MicroSD card into an Android device independent of any connection to MPE+.
  • FTK 5.6 Software Release

    12 Dec 2014 | 7:48 am
    AccessData's Forensic Toolkit 5.6 software upgrade is now available. Improvements: - System Information tab allows you to view system information that contains detailed information about disk images in an easy to read format. - Entity Extraction processing options to identify and extract specific types of data in your evidence such as credit card numbers, phone numbers and social security numbers - Exchange 2013 Support - KFF improvements - IPv6 support - and more Download Release Notes (pdf) Download Software Upgrade
  • Analyzing Windows Phone Artifacts with IEF

    10 Dec 2014 | 5:30 am
    New with Internet Evidence Finder (IEF) v6.5, Magnet Forensics has added support for a number of native and third-party apps for Windows Phone. Using JTAG and Chip-off techniques, forensics examiners can use IEF to recover call logs, SMS/MMS, emails, and contacts. One of the major challenges for Windows Phone analysis is the acquisition phase. Unlike other devices, such as iOS and Android, JTAG and Chip-off acquisitions are the only methods to acquire most Windows Phones. This means that your traditional forensic acquisition tools such as Cellebrite, XRY, MPE+, etc., cannot acquire the data…
 
  • add this feed to my.Alltop

    (ISC)2 Blog

  • 2015 Cybersecurity Predictions: Bolstering Budgets and Growing and Crumbling Technologies

    Hord Tipton
    11 Dec 2014 | 8:02 am
    As security professionals, we look back at 2014 with a sense of frustration that we are facing major security breaches in the news daily. This year has been our most challenging yet. The world is now well aware that no single industry is immune to cybersecurity attacks – from retailers to financial institutions to hospitals and governments. In fact, PricewaterhouseCoopers’s 2015 The Global State of Information Security Survey found that the total number of security incidents detected by respondents climbed to 42.8 million this year, an increase of 48% over 2013. Next year will certainly…
  • 2015 Cybersecurity Predictions: Security Moves into the C-Suite

    (ISC)² Management
    9 Dec 2014 | 12:00 pm
    The recent attack on Sony Pictures illustrates just how impactful a breach can be, and it will not be the last of its kind. While there are minimal concrete root causes known about the Sony attack, we can infer from the extent of the breach that practices and controls surrounding information access, desktop security, and network intrusion monitoring and prevention will be in the crosshairs. While defense and banking have held a 'do or die' approach to security for decades, many other organizations have passively entered an era where the means to destroy billions in shareholder value…
  • With Change Comes New Opportunities: (ISC)² Executive Director Retirement

    Hord Tipton
    4 Dec 2014 | 5:00 am
    This is a bittersweet announcement to let you know I will be retiring from my role as (ISC)2 executive director at the end of 2014. I have always embraced change and, as a result, I am fortunate to have enjoyable, wide-ranging life experiences. Working at (ISC)2 has been the highlight of my career. I consider our 100,000 members, the staff and board members, past and present, a part of my extended family. Over my six-and-a-half-year tenure, the organization has grown to more than 100,000 members worldwide; introduced three new certifications and subsequent education programs; established a…
  • Why Vote?

    (ISC)² Management
    25 Nov 2014 | 5:11 pm
    Your vote counts.  How (ISC)² members drive the direction of the organization.   In a recent election, the outcome was determined by a mere seven votes. If you think your vote doesn’t matter, think again. You have five days left to participate in the (ISC)² Board of Directors elections, and with less than a week, we’d like to remind you why your vote counts, and why your voice is vital.   What does your current Board of Directors think about elections? “The nomination and election process is one of the most significant tasks we have each year,” notes board member…
  • US Postal Service Breach Comments from (ISC)² Leadership

    (ISC)² Management
    10 Nov 2014 | 1:58 pm
    “Unfortunately, this breach is just the latest in a series of incidents that have targeted the US government.  It seems this particular incident revealed information on individuals that could lead to targeted spear-phishing attacks towards USPS employees.  All of us need to be aware of potential phishing schemes, but in this particular case, USPS employees should be on the lookout for any suspicious email that would serve as a mechanism to extract additional information such as USPS intellectual property, credit card information and other types of sensitive data.”-Dan Waddell,…
  • add this feed to my.Alltop

    DFI News All

  • Running Malware Analysis Apps as Docker Containers

    rwaters
    18 Dec 2014 | 8:22 am
    Read more about Running Malware Analysis Apps as Docker ContainersComments
  • Coolpad Android Devices Have Built in Backdoor

    rwaters
    18 Dec 2014 | 8:13 am
    Security researchers have discovered a backdoor in Android devices sold by Coolpad, a Chinese smartphone manufacturer. The “CoolReaper” vuln has exposed over 10 million users to potential malicious activity. Palo Alto Networks reckons the malware was “installed and maintained by Coolpad despite objections from customers”.Read more about Coolpad Android Devices Have Built in BackdoorComments
  • Spearfishing Attack Hooks ICANN

    rwaters
    18 Dec 2014 | 8:02 am
    The private agency that acts as a gatekeeper for the Internet on Wednesday said that hackers tricked their way into its computers.A "spearfishing" attack aimed at US-based nonprofit Internet Corporation for Assigned Names and Numbers (ICANN) hooked staff members with emails crafted to appear as though they were sent from peers using "icann.org" addresses, according to a blog post."The attack resulted in the compromise of the email credentials of several  ICANN staff members," ICANN said.Read more about Spearfishing Attack Hooks ICANNComments
  • Cyberattack on Syria Suggests Work of Islamic State Group

    rwaters
    18 Dec 2014 | 7:56 am
    Read more about Cyberattack on Syria Suggests Work of Islamic State GroupComments
  • SMU Cyber Warrior Recognized

    rwaters
    18 Dec 2014 | 7:32 am
    Southern Methodist University’s cyber warrior, Fred Chang, has been named an Information Security Magazine “Security 7” award winner, which annually spotlights information security leaders at the top of their profession.Read more about SMU Cyber Warrior RecognizedComments
  • add this feed to my.Alltop

    Secure Hunter Anti-Malware » Secure Hunter Blog

  • Your Browser is (not) Locked

    shadmin
    17 Dec 2014 | 7:05 pm
    Most ransomware has a binary file that needs to be executed before it can infect your PC. Ransomware usually relies on social engineering or exploits to infect unsuspecting users. However, some malware authors are bypassing this requirement with a new trick – browser lockers. Unlike traditional ransomware threats that lock the entire desktop, browser lockers only lock the web browser of an infected PC. Most other malware needs a user (or other malware) to manually run it. Browser lockers don’t need to be manually run, they don’t have a binary file and they are…
  • Google Adds Content Security Policy Support to Gmail Secure Hunter

    shadmin
    17 Dec 2014 | 4:51 pm
    Google has added another layer of security for users of Gmail on the desktop, which now supports content security policy, a standard that’s designed to help mitigate cross-site scripting and other common Web-based attacks. CSP is a W3C standard that has been around for several years, and it’s been supported in a number of browsers […] Threatpost | The first stop for security news Secure Hunter Anti -Malware The post Google Adds Content Security Policy Support to Gmail Secure Hunter appeared first on Secure Hunter Anti-Malware.
  • Researchers Go Inside Illegal Underground Hacking Markets Secure Hunter

    shadmin
    16 Dec 2014 | 4:50 pm
    Researchers at Dell SecureWorks have looked at services and pricing available inside illegal online marketplaces selling crimeware, stolen identities, credit cards, and hacking services. Threatpost | The first stop for security news Secure Hunter Anti -Malware The post Researchers Go Inside Illegal Underground Hacking Markets Secure Hunter appeared first on Secure Hunter Anti-Malware.
  • Honeywell PoS Software Vulnerable to Stack Buffer Overflows Secure Hunter

    shadmin
    15 Dec 2014 | 4:55 pm
    There are stack buffer overflows in two components of a Honeywell point-of-sale software package that can allow attackers to run arbitrary code on vulnerable systems. The vulnerabilities lie in the HWOPOSScale.ocx and HWOPOSSCANNER.ocx components of Honeywell’s OLE for Retail Point-of-Sale package, which is designed to help integrate PoS hardware with Windows PoS systems. Versions of the Honeywell […] Threatpost | The first stop for security news Secure Hunter Anti -Malware The post Honeywell PoS Software Vulnerable to Stack Buffer Overflows Secure Hunter appeared first on…
  • Upatre Downloader Spreading Dyreza Banking Trojan Secure Hunter

    shadmin
    13 Dec 2014 | 4:55 am
    Microsoft reports it has seen wire transfer spam carrying attachments containing the Upatre downloader which then infects machines with the Dyreza banking Trojan. Threatpost | The first stop for security news Secure Hunter Anti -Malware The post Upatre Downloader Spreading Dyreza Banking Trojan Secure Hunter appeared first on Secure Hunter Anti-Malware.
 
  • add this feed to my.Alltop

    Elvidence | Computer Forensics

  • Computer Forensics and eDiscovery, Are They the Same Thing?

    admin
    5 Dec 2014 | 7:21 pm
    As businesses and individuals store more and more of their data in electronic format, whether on computers, mobile devices or in the cloud, the ability to extract and present that information in legal proceedings and disputes becomes more crucial. Most people would see this as Computer Forensics or eDiscovery, and indeed the terms are often used to mean the same thing. But the two aren’t quite the same and it’s important to understand why that’s so. The Main Differences In truth, the processes involved are very similar. Both involve the identification, preservation, collecting,…
  • How to avoid falling victim to BadUSB

    admin
    22 Nov 2014 | 9:34 pm
    One of the information security weaknesses that’s hit the news recently is the ‘BadUSB’ vulnerability. First revealed by researchers last summer, BadUSB allows the controller chips in USB devices to be reprogrammed so that they behave in a malicious way. There are a number of manufacturers of these chips which are used in flash drives and a wide range of other USB devices including external storage, printers and cameras. Depending on who made the chips some can be reprogrammed, some can’t and some only in a particular set of circumstances. The problem is that makers of end-user…
  • Computer Forensic Investigator = Protecting Your Business

    admin
    1 Nov 2014 | 5:56 am
    Computer forensics is usually something that is associated with legal proceedings, yet it has other uses too. As businesses come to rely more and more on data, the ability to have a detailed analysis of the contents of a PC carried out via computer forensic investigator can be extremely useful. It can help identify internal issues such as who is accessing data or using systems for personal tasks, it can show where leaks have taken place and it can help pinpoint factors to improve the security of your data. Spotting Internal Threats Data is a valuable commodity for most businesses today and…
  • When is an Expert Opinion Allowed in Law?

    admin
    23 Oct 2014 | 9:39 pm
    There’s an old joke which says that the definition of ‘expert’ is derived from ‘ex’ – meaning a has been, and ‘spurt’ – meaning a drip under pressure. In the legal world though defining an expert is rather more serious. Similarly an opinion, in most cases, is simply whatever an individual thinks. However, the law likes to deal with facts which means that opinion can be something of a dirty word. Expert opinions are a different matter and are often called on when legal matters deal with specialist areas. Let’s take a more detailed look at when an expert opinion is…
  • Demystifying the eDiscovery Process

    admin
    16 Oct 2014 | 6:46 am
    As a society our increased reliance on computers, smartphones and other electronic gadgets means that more and more of our information is stored in digital form. From a lawyer’s point of view this electronically stored information (ESI) presents a number of challenges in terms of capturing and preserving material relevant to a particular case. What is ESI? Put simply, any device containing electronic storage can be a source of ESI. These can be company servers, desktop or laptop PCs and workstations used by employees, as well as mobile devices such as smartphones and tablets. ESI isn’t…
Log in