Digital Forensics

  • Most Topular Stories

  • NCA arrests six Lizard Squad users after gaming firms, retailers targetted Secure Hunter

    Secure Hunter Anti-Malware » Secure Hunter Blog
    shadmin
    30 Aug 2015 | 5:51 pm
    Officers also visiting 50 addresses for a quiet word The National Crime Agency has arrested six users of a Lizard Squad DDoS attack tool, which had been used against a national newspaper, a school, gaming companies, and a number of online retailers.… The Register – Security Secure Hunter Anti -Malware The post NCA arrests six Lizard Squad users after gaming firms, retailers targetted Secure Hunter appeared first on Secure Hunter Anti-Malware.
  • "Device Profiling With Windows Prefetch"

    SANS Digital Forensics and Incident Response Blog
    Chad Tilbury
    18 Aug 2015 | 9:43 pm
    It wasn't that long ago that every report I read containing Windows prefetch artifacts included only the basics: executable name, first and last time executed (now eight timestamps in Win8), and number of executions. There is much more information stored in prefetch files, but until recently there were few tools toeasily parse and provide it to the examiner. Mark McKinnon wrote one of the first prefetch parsers to include full path names for additional files accessed within the first ten seconds of application launch. TZWorks' pf tool now also provides this information.Depending on case type,…
  • AccessData to Host World Tour

    Forensic Focus
    31 Aug 2015 | 3:42 am
    A Roadshow World Tour is set to be hosted by AccessData in the month of October. The Roadshow will include several cities in the US as well as Internationally.
  • "Hindering Exploitation by Analysing Process Launches"

    SANS Digital Forensics and Incident Response Blog
    Adam Kramer
    30 Aug 2015 | 10:28 pm
    Malware can do some nasty things to your system, but it needs to get on there first. Thankfully, users have become more suspicious of files named FunnyJokes.doc.exe and so malware authors have had to become more innovative, using a mix of social engineering and the constant stream of 0-day browser exploits to land evil code on your box.Popular infection methods include leveraging exploit kits to run arbitrary code in the context of your browser and 'infecting' documents files, such as Microsoft Word documents, which still, 20 years since the first macro virus, allow you to automate the…
  • Updates & Links

    Windows Incident Response
    Harlan Carvey
    28 Aug 2015 | 4:33 am
    HTCIA2015 PresentationsFor those of you attending HTCIA2015 (or just interested), I printed my presentations to PDF format and uploaded them to my GitHub site.  Unfortunately, as you'll see, particularly with the Registry analysis presentation, there are slides that are just place holders, so you won't know what is said unless you're actually there.IndicatorsI recently read this post at the SecurityIntelligence web site, and was more than just a little happy to see a malware write-up that contained host-based indicators that could be used by analysts to determine if a system…
  • add this feed to my.Alltop

    SANS Digital Forensics and Incident Response Blog

  • "Hindering Exploitation by Analysing Process Launches"

    Adam Kramer
    30 Aug 2015 | 10:28 pm
    Malware can do some nasty things to your system, but it needs to get on there first. Thankfully, users have become more suspicious of files named FunnyJokes.doc.exe and so malware authors have had to become more innovative, using a mix of social engineering and the constant stream of 0-day browser exploits to land evil code on your box.Popular infection methods include leveraging exploit kits to run arbitrary code in the context of your browser and 'infecting' documents files, such as Microsoft Word documents, which still, 20 years since the first macro virus, allow you to automate the…
  • "Device Profiling With Windows Prefetch"

    Chad Tilbury
    18 Aug 2015 | 9:43 pm
    It wasn't that long ago that every report I read containing Windows prefetch artifacts included only the basics: executable name, first and last time executed (now eight timestamps in Win8), and number of executions. There is much more information stored in prefetch files, but until recently there were few tools toeasily parse and provide it to the examiner. Mark McKinnon wrote one of the first prefetch parsers to include full path names for additional files accessed within the first ten seconds of application launch. TZWorks' pf tool now also provides this information.Depending on case type,…
  • "A Threat Intelligence Script for Qualitative Analysis of Passwords Artifacts"

    John Franolich
    30 Jul 2015 | 8:52 pm
    The Verizon Data Breach Report has consistently said, over the years, passwords are a big part of breach compromises. Dr. Lori Cranor, and her team, at CMU has done extensive research on how to choose the best password policies verses usability. In addition, Alison Nixon's research describes techniques to determine valid password of an organization you are not a part of ("Vetting Leaks Finding the Truth when the Adversary Lies"). What about passwords leaked in the organization you are defending? This post will be about such a scenario.According to former Deputy Director, of The…
  • "Data, Information, and Intelligence: Why Your Threat Feed Is Likely Not Threat Intelligence"

    robertmlee
    8 Jul 2015 | 11:38 pm
    Threat feeds in the industry are a valuable way to gather information regarding adversaries and their capabilities and infrastructure. Threat feeds are usually not intelligence though. Unfortunately, one of the reasons many folks become cynical about threat intelligence is because the industry has pushed terminology that is inaccurate and treated threat intelligence as a solution to all problems. In a talk I gave at the DFIR Summit in Austin, Texas I compared most of today's threat intelligence to Disney characters — because both are magical and made up.When security personnel…
  • "Detecting Shellcode Hidden in Malicious Files"

    Adam Kramer
    28 Jun 2015 | 12:49 am
    A challenge both reverse engineers and automated sandboxes have in common is identifying whether a particular file is malicious or not. This is especially true if the malicious aspects are obfuscated and only triggered under very specific circumstances.There are a number of techniques available to try and identify embedded shellcode, for example searching for patterns (NOP sleds, GetEIP etc), however as attackers update their methods to overcome our protections it becomes more difficult to find the code without having the exact version of the vulnerable software targeted, and allowing the…
 
  • add this feed to my.Alltop

    Windows Incident Response

  • Updates & Links

    Harlan Carvey
    28 Aug 2015 | 4:33 am
    HTCIA2015 PresentationsFor those of you attending HTCIA2015 (or just interested), I printed my presentations to PDF format and uploaded them to my GitHub site.  Unfortunately, as you'll see, particularly with the Registry analysis presentation, there are slides that are just place holders, so you won't know what is said unless you're actually there.IndicatorsI recently read this post at the SecurityIntelligence web site, and was more than just a little happy to see a malware write-up that contained host-based indicators that could be used by analysts to determine if a system…
  • Updates

    Harlan Carvey
    16 Aug 2015 | 4:02 am
    RegRipper Plugin UpdatesI made some updates to a couple of plugins recently.  One was to the networklist.pl/networklist_tln.pl plugins; the update was to add collecting subkey names and LastWrite times from beneath the Nla\Cache\Intranet key.  At this point, I'm not 100% clear on what the dates refer to, but I'm hoping that will come as the data is observed and added to timelines.I also updated the nic2.pl plugin based on input from Yogesh Khatri.  Specifically, he found that in some cases, there's a string (REG_SZ) value named "DhcpNetworkHint" that, if you reverse the…
  • BSidesCincy Follow up

    Harlan Carvey
    26 Jul 2015 | 11:50 am
    I had the distinct honor of speaking at @BSidesCincy this past weekend, and I greatly appreciate the opportunity that Justin, Josh, and the entire crew provided for me to speak.In my time, I've been to a number of conferences.  I started with Usenix back in '99, and that experience was a bit different for me, in that the vast majority of my public speaking to that point had been in the military (during training, and while providing training).  Over the years, I've attended (I prefer to speak at conferences in an attempt to keep costs to my employer down...) several…
  • Ghost Busting

    Harlan Carvey
    13 Jul 2015 | 6:48 am
    First, read Jack's post, Don't wait for an intrusion to find you. Next, read this post (The Blue Team Myth).Notice any similarities...not in content, but in the basic thought behind them?Yeah, me, too.  Great minds, eh?  Okay, maybe not...butSo, you're probably wondering what this has to do with Ghostbusters...well, to many, an intruder within the infrastructure may seem like a ghost, moving between systems and through firewalls, apparently like an apparition.  One thing I've seen time and again during incident response is that an intruder is not encumbered by the…
  • The Blue Team Myth

    Harlan Carvey
    23 Jun 2015 | 6:05 pm
    The 2015 M-Trends Report states that the median number of days that threat groups were present in a victim's network before detection was 205 days, which is down 24 days from 2013.  But that's the median number of days...the longest persistence was 2,982 days.  That's over 8 years.  The report also states that 69% of organizations were informed of the breach by an external entity.The 2015 TrustWave Global Security Report indicates that 81% of companies did not detect breaches on their own, and that the median length of time it took to detect a breach was 86 days.What…
  • add this feed to my.Alltop

    TaoSecurity

  • Top Ten Books Policymakers Should Read on Cyber Security

    Richard Bejtlich
    14 Aug 2015 | 12:28 pm
    I've been meeting with policymakers of all ages and levels of responsibility during the last few months. Frequently they ask "what can I read to better understand cyber security?" I decided to answer them collectively in this quick blog post.By posting these, I am not endorsing everything they say (with the exception of the last book). On balance, however, I think they provide a great introduction to current topics in digital security.Cybersecurity and Cyberwar: What Everyone Needs to Know by Peter W. Singer and Allan FriedmanCountdown to Zero Day: Stuxnet and the Launch of the World's First…
  • Effect of Hacking on Stock Price, Or Not?

    Richard Bejtlich
    7 Aug 2015 | 5:19 pm
    I read Brian Krebs story Tech Firm Ubiquiti Suffers $46M Cyberheist just now. He writes:Ubiquiti, a San Jose based maker of networking technology for service providers and enterprises, disclosed the attack in a quarterly financial report filed this week [6 August; RMB] with the U.S. Securities and Exchange Commission (SEC). The company said it discovered the fraud on June 5, 2015, and that the incident involved employee impersonation and fraudulent requests from an outside entity targeting the company’s finance department.“This fraud resulted in transfers of funds…
  • Going Too Far to Prove a Point

    Richard Bejtlich
    21 Jul 2015 | 6:45 am
    I just read Hackers Remotely Kill a Jeep on the Highway - With Me in It by Andy Greenberg. It includes the following:"I was driving 70 mph on the edge of downtown St. Louis when the exploit began to take hold...To better simulate the experience of driving a vehicle while it’s being hijacked by an invisible, virtual force, Miller and Valasek refused to tell me ahead of time what kinds of attacks they planned to launch from Miller’s laptop in his house 10 miles west. Instead, they merely assured me that they wouldn’t do anything life-threatening. Then they told me to drive the Jeep…
  • My Security Strategy: The "Third Way"

    Richard Bejtlich
    30 Jun 2015 | 12:23 pm
    Over the last two weeks I listened to and watched all of the hearings related to the OPM breach. During the exchanges between the witnesses and legislators, I noticed several themes. One presented the situation facing OPM (and other Federal agencies) as confronting the following choice:You can either 1) "secure your network," which is very difficult and going to "take years," due to "years of insufficient investment," or 2) suffer intrusions and breaches, which is what happened to OPM.This struck me as an odd dichotomy. The reasoning appeared to be that because OPM did not make "sufficient…
  • My Prediction for Top Gun 2 Plot

    Richard Bejtlich
    30 Jun 2015 | 8:01 am
    We've known for about a year that Tom Cruise is returning to his iconic "Maverick" role from Top Gun, and that drone warfare would be involved. A few days ago we heard a few more details in this Collider story:[Producer David Ellison]: There is an amazing role for Maverick in the movie and there is no Top Gun without Maverick, and it is going to be Maverick playing Maverick. It is I don’t think what people are going to expect, and we are very, very hopeful that we get to make the movie very soon. But like all things, it all comes down to the script, and Justin is writing as we…
 
  • add this feed to my.Alltop

    Forensic Focus

  • AccessData to Host World Tour

    31 Aug 2015 | 3:42 am
    A Roadshow World Tour is set to be hosted by AccessData in the month of October. The Roadshow will include several cities in the US as well as Internationally.
  • Webinar: Tackle the Legal Issues of Obtaining Digital Evidence in the Cloud

    28 Aug 2015 | 9:03 am
    A recording of the webinar "Tackle the Legal Issues of Obtaining Digital Evidence in the Cloud" is now online and available to view here. Join the forum discussion here. View the webinar on YouTube here. Read a full transcript of the webinar here.
  • Oxygen Forensics Appoints Lee Reiber COO for North America

    27 Aug 2015 | 3:24 am
    Oxygen Forensics, the worldwide developer and provider of the advanced forensic data examination tools for mobile devices, announced today that Lee Reiber has been appointed Chief Operations Officer. Mr. Reiber will be responsible for running Oxygen’s North American branch, bolstering the company’s expertise in the space of mobile forensics.
  • Webinar: Forensic Capabilities of ReclaiMe Pro

    26 Aug 2015 | 2:12 am
    A recording of the webinar "Forensic Capabilities of ReclaiMe Pro" is now online and available to view here. Join the forum discussion here. View the webinar on YouTube here. Read a full transcript of the webinar here.
  • Review: AccessData FTK Advanced Live Online Training

    25 Aug 2015 | 11:28 am
    Reviewed by Scar de Courcier, Forensic Focus On the 11th-13th of August 2015, AccessData ran a live online training course to teach FTK users how to get the most out of the software solution. The course was aimed at people who had already used FTK and completed some basic training beforehand, and aimed to expand investigators’ knowledge of the tool. The training itself was managed by Syntricate which, although technically a part of AccessData, was created to offer training and education for digital forensics professionals. Syntricate aims to be as platform-agnostic as possible during…
 
  • add this feed to my.Alltop

    (ISC)2 Blog

  • The University of the Cumberlands Knows No Boundaries

    (ISC)² Management
    13 Aug 2015 | 8:02 am
    For Donnie Grimes, (ISC)² Global Academic Program (GAP) instructor and vice president of information systems and creator of the Master’s program in cybersecurity for the University of the Cumberlands, based in Williamsburg, Kentucky, breaches know no boundaries – and neither should cybersecurity education. A GAP member since 2014, the University has historically served people from the Appalachia area; and until 2014, had no cybersecurity offering. Over the past 10-15 years, however, its sphere of influence has increased, with thriving graduate programs and students representing 58…
  • To (ISC)² Global Academic Program (GAP) Instructor John Sands, the Next Generation is Everything

    (ISC)² Management
    4 Aug 2015 | 7:33 am
    To GAP instructor John Sands, the next generation is everything. He has dedicated his career to teaching and creating programs that fill the cybersecurity education gap that persists today. His work has propelled the cybersecurity field forward by decades. In addition to his role as GAP instructor, Sands is also the department chair for Computer Integrated Technologies at Moraine Valley Community College and co-founder for the National Center for Systems Security and Information Assurance (CSSIA), a GAP member since 2014. Early in his career, he recognized that schools and universities were…
  • 5 Reasons Security Congress is the (ISC)² Member Event of the Year

    Moderator
    13 Jul 2015 | 6:00 am
    The fifth annual (ISC)² Security Congress, proudly co-located with the 61st annual ASIS International Annual Seminar and Exhibits, is scheduled for September 28 through October 1 in Anaheim, California, U.S.A. We expect more than 19,000 information security and operational security professionals to join us, making this one of the largest and most unique conferences you will experience. In honor of the fifth annual (ISC)² Security Congress, here are five reasons this year's Security Congress is the (ISC)² member event of the year. Largest CPE Opportunity of the Year With so much to see…
  • Why Hiring CCSPs will Help the C-Suite Sleep at Night

    (ISC)² Management
    8 Jul 2015 | 10:56 am
    A few short years ago, cloud computing was considered a relatively new concept inherent with risks that many IT professionals weren’t comfortable taking. I’ll avoid the debate about who coined the term cloud computing, but I’m old enough to remember how we formerly referenced the cloud in telecommunications as a way to simplify and abstract the details of the external network that’s connected to internal devices. Today, the concept of cloud computing is intended to simplify communication by eliminating the need to know all of the specifics of the cloud provider’s underlying software…
  • A Simpler Way to Research Regulatory Requirements

    (ISC)² Management
    30 Jun 2015 | 9:40 am
    Commonplace to information security professionals, regulatory compliance does not necessarily guarantee security. However, in a world rife with perpetual breaches and data loss, we hear more and more about the importance of regulatory compliance and IT governance, risk management and compliance (or GRC for short). For those folks who are required to abide by regulations such as HIPAA, SOX or PCI (especially those who fall under multiple regulations), maintaining compliance can be cumbersome. These requirements, in addition to normal information security duties, can be simply overwhelming for…
  • add this feed to my.Alltop

    Crime Museum » Blog

  • Wildlife Trafficking

    Susan Frese
    8 Aug 2015 | 1:32 pm
    In 2014 over 40,000 elephants and 1,200 rhinos were killed by poachers for their ivory horns and tusks, worth as much as $250,000 on the underground market. If this rate continues, both elephants and rhinos will be extinct within the next 10 years. In the past decade, 1,000 rangers have been killed in efforts to stop these illegal activities. Conservationists and African officials are now turning to new techniques in their fight against poaching. One modern tactic is the use of Unmanned Aerial Vehicles, better known as drones, to catch poachers in the act and protect endangered species such…
  • Murder?

    wilson.dejesus
    4 Jul 2015 | 7:00 am
    Murder? Sir William Blackstone, an 18th century English judge, is known for writing Commentaries on the Laws of England. This work was the original foundation for legal education in America and dominated the common law legal system for centuries. Blackstone broke the definition of murder down into five elements: 1. Unlawful 2. killing 3. of a human 4. by another human 5. with malice aforethought. The law was designed to define the various degrees and circumstances of murder in order to provide and achieve justice for all. Even though Blackstone did his best to dissect and define murder, in…
  • Profiles in Crime: Rayful Edmond

    crimemuseum
    21 Jun 2015 | 9:05 pm
    Rayful Edmond: The profile of a Kingpin. Called the John Gotti of Washington, D.C., notorious gangster Rayful Edmond terrorized and awed the Washington metropolitan area in the mid to late 1980’s with his tight control of the crack cocaine trade and accompanying lavish spending sprees. Known for dropping several thousand dollars a night at clubs, Edmond supposedly spent over $400,000 at a single store in the Georgetown neighborhood, whose owner was, coincidentally, convicted of money laundering soon after. Partially thanks to Edmond’s reign as drug lord, Washington, D.C. became known as…
  • Pro Se: Representing Yourself in Court

    crimemuseum
    5 Jan 2015 | 4:00 am
    Pro Se is a legal term that comes from Latin, meaning ‘for oneself’. It essentially means that you are representing yourself in court by choice without the help of an attorney. In the United States’ legal system, every individual is guaranteed, by the sixth amendment, the right to an appointed counsel, and also the right to represent him or herself in court. People may choose to represent themselves in court for a variety of reasons, including: avoiding the expense of hiring a lawyer, for smaller cases, the matter is often simple enough that the individual can take care of it them…
  • Do You Have Your Father’s Nose?

    crimemuseum
    27 Oct 2014 | 2:44 am
    Do you have your father’s nose? There are 29 bones (hyoid included) in the human skull, and for many years anthropologists have been using markers from this area of the body to determine sex, age, race, and to make personal identifications. However, forensic anthropology is a science that is greatly affected by changes and new developments in social morays and folkways. Simply put, what was once socially unacceptable often becomes acceptable, and even encouraged, with time. This fact is abundantly clear when one thinks about the checkered history of the United States. While being a…
  • add this feed to my.Alltop

    Secure Hunter Anti-Malware » Secure Hunter Blog

  • Ruskie ICS hacker drops nine holes in popular Siemens power plant kit Secure Hunter

    shadmin
    31 Aug 2015 | 5:51 pm
    WinCC HMI control platform used in Natanz, Large Hadron Collider. Ilya Karpov of Russian security outfit Positive Technologies has reported nine vulnerabilities in Siemens industrial control system kit used in critical operations from petrochemical labs and power plants up to the Large Hadron Collider.… The Register – Security Secure Hunter Anti -Malware The post Ruskie ICS hacker drops nine holes in popular Siemens power plant kit Secure Hunter appeared first on Secure Hunter Anti-Malware.
  • Jailbreaking pirates popped in world’s largest iCloud raid Secure Hunter

    shadmin
    31 Aug 2015 | 5:50 am
    Cheaters, tweakers, hackers and crackers torn up by nasty Cydia bundle. The largest Apple credential raid in history has seen nearly a quarter of a million accounts compromised by malware targeting app pirates.… The Register – Security Secure Hunter Anti -Malware The post Jailbreaking pirates popped in world’s largest iCloud raid Secure Hunter appeared first on Secure Hunter Anti-Malware.
  • NCA arrests six Lizard Squad users after gaming firms, retailers targetted Secure Hunter

    shadmin
    30 Aug 2015 | 5:51 pm
    Officers also visiting 50 addresses for a quiet word The National Crime Agency has arrested six users of a Lizard Squad DDoS attack tool, which had been used against a national newspaper, a school, gaming companies, and a number of online retailers.… The Register – Security Secure Hunter Anti -Malware The post NCA arrests six Lizard Squad users after gaming firms, retailers targetted Secure Hunter appeared first on Secure Hunter Anti-Malware.
  • Spaniard claims WWII WAR HERO pigeon code crack. Explain please Secure Hunter

    shadmin
    30 Aug 2015 | 5:51 am
    Come on, give it up and let Speckled Jim rest in peace A 22-year old Spaniard claims that he’s cracked a previously unsolved WWII coded message. Others have claimed this before and there’s nothing particularly solid to back up the latest effort, but let’s have a look at it anyway.… The Register – Security Secure Hunter Anti -Malware The post Spaniard claims WWII WAR HERO pigeon code crack. Explain please Secure Hunter appeared first on Secure Hunter Anti-Malware.
  • Drum roll, please …. Results are in for the collective noun for security vulns Secure Hunter

    shadmin
    29 Aug 2015 | 5:52 pm
    It’s a fix! A security fix! We’ve closed the poll, and the results for our attempts to weed out candidates for a collective noun for security vulnerabilities are in.… The Register – Security Secure Hunter Anti -Malware The post Drum roll, please …. Results are in for the collective noun for security vulns Secure Hunter appeared first on Secure Hunter Anti-Malware.
 
  • add this feed to my.Alltop

    Computer Forensic Investigations | Elvidence

  • The hidden price of data breaches

    admin
    31 Aug 2015 | 5:24 am
    Hardly a week seems to go by at the moment without news of personal data being leaked from a website, eCommerce company or government department. Whilst this is always inconvenient, leading to users having to change passwords, it can be much worse. If it involves the leakage of email addresses victims may be targeted with spam and phishing attacks, and if credit card details are leaked there can be a financial cost too. In the case of the Ashley Madison hack – the controversial site based in Canada that allows people to arrange extra-marital affairs – there have been a number of…
  • Digital forensics to aid investigative journalism

    admin
    9 Aug 2015 | 10:38 am
    Like many other professions, journalism in Australia has come under increasing pressure in recent years thanks to tighter budgets and the rise of the Internet offering easy, free access to information. Combine this with the rise of citizen journalism and a 24-hour news cycle and traditional journalism begins to look like an endangered species. None of this means that there’s no longer a place for traditional journalism, however, particularly when it comes to the things it does best like uncovering big stories and providing the in-depth coverage that ‘instant’ media can’t.
  • When to ask for a computer forensic second opinion

    admin
    3 Jul 2015 | 10:42 am
    Whether it’s a criminal trial, an employment tribunal or a trade dispute, legal matters increasingly touch on some form of technology. Because computer, mobile phones and other devices have become so ubiquitous the information they store and process touches on almost all areas of our lives. A computer forensic investigation is therefore becoming a common feature in all kinds of legal matters. Forensic specialists are called in to extract data and ensure that it’s preserved in a form that is acceptable as evidence If you’ve gone to the time and expense of getting a report from a computer…
  • Computer Forensic Expert: Specialist and Investigator

    admin
    25 Jun 2015 | 7:48 am
    In the modern world we’re constantly being bombarded with news of data security breaches and lost data. It’s no surprise then that businesses are increasingly calling on the services of a Computer Forensic specialist to investigate problems. This isn’t only related to cyber crime, a Computer Forensic Expert can be of help with many day-to-day issues like employee misuse of equipment or data leakage from within an organisation. Just What is a Computer Forensic Investigation? A Computer Forensic Investigator is heavily reliant on his or her own knowledge, experience, expertise, diligence,…
  • Information Security Risks

    admin
    14 May 2015 | 6:02 am
    Digital technologies have touched almost every aspect of our life to some extent. Cloud, big data, mobile computing devices and social networking have profoundly changed the dynamics of the modern business. These technologies help us do our work more efficiently, enable businesses connect with genuine customers and deliver better, more personalised products or services. For organisations, the ability to quickly adapt to innovations and implement digital technology that enhances their productivity is a must in the current economic climate. At the same time organisations are being constantly…
  • add this feed to my.Alltop

    Kessler International | Forensic Accounting, IP Protection, Cell Phone Forensics, Computer Forensics | RSS Feed

  • Vol. 13, Number 1

    ki-admin
    31 Aug 2015 | 7:05 am
    A ‘Smart’ Investigation A landmark 2014 United States Supreme Court case ruled that a warrant is now required for the legal search of a cell phone by law enforcement officers. Given the amount of information this tiny device can hold, it is not too surprising that standard privacy rights have been extended in this Digital Age. Under this new ruling, law enforcement is still permitted to search the physical aspects of the phone for safety precautions. However, the Supreme Court determined that the data stored inside the device poses no imminent threat, and therefore a search of the…
  • The Royal Pain with Royalties

    ki-admin
    19 Aug 2015 | 7:11 am
    Do you have an idea that you know will just take-off once people know about it? Are you a musician that just wrote the perfect song? Maybe you finally pitched the perfect scene that got picked up in a television or film development deal or perhaps you’ve just invented the next great vegetable slicer, but can’t get the project off the ground, and why not? Well, you might be in need of some capital. Investors or distributors may provide you with the funding you need, but there will surely be a price for you to pay. Usually, you will have to sign over a portion of the rights or licensing to…
  • Prospective Client of a Forensic Accounting Firm: What You Need to Know

    ki-admin
    17 Aug 2015 | 2:10 pm
    Unfortunately, many people and businesses retain the services of a forensic accounting firm after it is already too late. Money has already been lost, and these individuals and companies are left scrambling to pick up the pieces. Forensic accountants are expert auditors that not only know where to look for financial irregularities, but are also trained in figuring out how they occur. Given this training, forensic accountants have the knowledge and professional acumen to provide key insight regarding fraud prevention or how to protect against financial misappropriation. Becoming a client of a…
  • Cell Phone Forensics – When You Need It and What You Should Do

    ki-admin
    14 Aug 2015 | 6:50 am
    In today’s age, everyone is connected to their mobile device. We use our cell phones to communicate, share information, send photos, and connect via endless social media platforms. Some of us even use our phones to take care of financial and banking needs. With all of this activity taking place on our phones, the need to cell phone forensics is ever-growing. Here are few reasons why you might need a cell phone forensic investigation. Cyber-Bullying As a parent, it is sometimes hard to know if your child is using their mobile device appropriately. It is so easy in the world of social media…
  • Hiring a Forensic Accounting Firm

    ki-admin
    12 Aug 2015 | 11:20 am
    Balancing a checkbook may be a thing of the past, but now that most banking is done online, it should be easier to notice any irregularities. Whether you own a business or just want peace of mind regarding your finances, you may want to consider hiring a forensic accounting firm. Whereas accountants can often spot irregularities in financial documents in a mere glance, forensic accountants look behind the numbers to figure out how the irregularities happened. While it may appear that forensic accountants are miracle workers that can turn water into wine, it’s not always the case. Forensic…
Log in