Digital Forensics

  • Most Topular Stories

  • Online Harassment A New Legal Concern

    Forensic Focus
    25 May 2015 | 2:59 am
    Wood County Prosecutor Jason Wharton said computer crime related to harassment or abuse of individuals via social media is a developing and relatively new area of law. "As technology changes and the way people use that technology changes, legislatures must address whether amendments are necessary to address the technological changes," he said. Presently, as it relates to harassment or abuse of an individual, many of the remedies available to a victim are civil in nature. "There are, however, some limited contexts in which actions taken or statements made in social media may constitute a…
  • Interview with Philipp Amann, Senior Strategic Analyst, Europol

    Forensic Focus
    26 May 2015 | 4:51 am
    Philipp, you presented a paper at DFRWS about robustness and resilience in digital forensics laboratories. Could you briefly outline your research for our readers? The main focus of our research is on identifying the key elements of resilience and robustness in digital forensics frameworks. In this paper, we aimed to identify the elements that allow an organization with digital forensic capabilities to adapt to change in a controlled and managed way; one of the main questions was how organisations can sustain their digital forensics capabilities and stay agile within controlled boundaries…
  • Webinar: Analyzing Evidence from Mobile Devices - Hidden and Deleted Data

    Forensic Focus
    25 May 2015 | 7:07 am
    https://attendee.gotowebinar.com/register/6044973458626959618 Date: Tuesday May 26, 2015 Time: 7am PT/10am ET/2pm GMT/3pm BST Presenter: Tatiana Pankova, Marketing Manager, Oxygen Forensics Learn how to uncover a suspect or victim's activities with timeline, communication and location data. Discover how investigators can track user locations, build and map their historic routes, and clearly see all activities performed by the user at each location. Learn how to discover social connections between the users of multiple mobile devices and produce charts and tables revealing the user's closest…
  • "SANS #CEICCONF #DFIR CHALLENGE 3 - 20 May 2015"

    SANS Digital Forensics and Incident Response Blog
    Rob Lee
    19 May 2015 | 9:00 pm
    Answer the following three questions based on the evidence provided below. Write the answers down on your PC or a piece of paper. Stopby the SANS Booth at CEIC #227 and be one of the first 15 DFIR professionals who get the answers correct will win a DFIR Shirt in their size.
  • Links and Stuff

    Windows Incident Response
    Harlan Carvey
    26 May 2015 | 4:58 pm
    Registry GoodnessI recently wrote a RegRipper plugin, based on this KB article; on 26 May, I committed it to the plugin repository.  I had tweeted to ask the DFIR community if this information was relevant to their investigations, and there was not a great deal of response on the topic...although there was apparently some confusion.  I hope that folks take the time to try it, and I hope it's of some use to the DFIR community.  I don't often (scratch that...in 15+ years of doing DFIR work, I've never...) need to determine the history of GPOs assigned to a system.Speaking of…
  • add this feed to my.Alltop

    SANS Digital Forensics and Incident Response Blog

  • "SANS #CEICCONF #DFIR CHALLENGE 3 - 20 May 2015"

    Rob Lee
    19 May 2015 | 9:00 pm
    Answer the following three questions based on the evidence provided below. Write the answers down on your PC or a piece of paper. Stopby the SANS Booth at CEIC #227 and be one of the first 15 DFIR professionals who get the answers correct will win a DFIR Shirt in their size.
  • "SANS #CEICCONF #DFIR CHALLENGE 2 - 19 May 2015"

    Rob Lee
    18 May 2015 | 9:28 pm
    Answer the following three questions based on the evidence provided below. Write the answers down on your PC or a piece of paper. Stopby the SANS Booth at CEIC #227 and be one of the first 15 DFIR professionals who get the answers correct will win a DFIR Shirt in their size.
  • "SANS #CEICCONF #DFIR CHALLENGE 1 - 18 May 2015"

    Rob Lee
    18 May 2015 | 12:15 am
     Answer the following three questions based on the evidence provided below. Write the answers down on your PC or a piece of paper. Stopby the SANS Booth at CEIC #227 and be one of the first 15 DFIR professionals who get the answers correct will win a DFIR Shirt in their size.
  • "Call For Presenters -- DFIR Prague 2015 #DFIRPrague"

    SANS Institute
    10 May 2015 | 11:42 pm
    Submit your submissions to dfireuropecfp@sans.org by 5 pm BST on 1 June, 2015 with the subject "SANS DFIR Europe Summit."Dates:Summit Date: - 11 October, 2015Pre-Summit Training Course Dates: 5-10 October, 2015Post-Summit Training Course Dates: 12-17 October, 2015Summit Venue:Angelo Hotel Prague Radlicka 1-G, Prague 5 Prague, CZPhone: +420 234 801 111SANS' annual dedicated Digital Forensics and Incident Response (DFIR) Summit & Training event returns for 13 days of intensive ...
  • "Identifying and Disrupting Crypto-Ransomware (and Destructive Malware)"

    Adam Kramer
    2 Apr 2015 | 8:30 pm
    In recent years, malware has become very personal. Crypto-ransomware threats, including CryptoLocker, CryptoWall and TorrentLocker (pdf), have infected home users, businesses and even police departments, all of whom have had their personal data and hard work held hostage. When we think of precious family photos or an academic thesis being wiped by pure greed, it can become rather emotive. This is nasty stuff, and we need to do something about it!I have been giving some thought to how we can stop crypto-ransomware doing it's thing. Initially, I thought about interfering with the
 
  • add this feed to my.Alltop

    Windows Incident Response

  • Links and Stuff

    Harlan Carvey
    26 May 2015 | 4:58 pm
    Registry GoodnessI recently wrote a RegRipper plugin, based on this KB article; on 26 May, I committed it to the plugin repository.  I had tweeted to ask the DFIR community if this information was relevant to their investigations, and there was not a great deal of response on the topic...although there was apparently some confusion.  I hope that folks take the time to try it, and I hope it's of some use to the DFIR community.  I don't often (scratch that...in 15+ years of doing DFIR work, I've never...) need to determine the history of GPOs assigned to a system.Speaking of…
  • Stuff

    Harlan Carvey
    5 May 2015 | 5:51 pm
    Plugin UpdatesEric Zimmerman reached to me a little while ago and let me know that he'd taken a look at the AppCompatCache data from a Windows 10 system, and found that...wait for it...the format of the data was different from previous versions of Windows.  O.  M.  G. Thanks to the heads up from Eric, I've updated the RegRipper plugins for parsing this data.  However, my testing was extremely limited; I had only one System hive file (from a Windows 10 TP VM that I'd set up) on which to test the parsing code.  A dearth of testing data has been an issue since I started…
  • Timeline Analysis Process

    Harlan Carvey
    26 Apr 2015 | 4:25 am
    Having discussed timeline analysis in a couple of blog posts so far (such as here...), I thought I'd take an opportunity to dig a bit deeper into the process I've been using for some time to actually conduct analysis of timelines that I create during engagements.Before we get into the guts of the post, I'd like to start by saying that this is what I've found that works for me, and it does not mean that this is all there is.  This is what I've done, and been doing, tweaking the process a bit here and there over the years.  I've looked at things like visualization to try to assist in…
  • Micro- & Mini-Timelines

    Harlan Carvey
    19 Apr 2015 | 6:27 am
    I don't always create a timeline of system activity...but sometimes when I do, I don't have all of the data from within the system image available.  Many times, I will create a mini-timeline because all I have available is either limited data sources, or even just a single data source.  I've been sent Event Logs (.evt files) or a couple of Windows Event Logs (.evtx files), and asked to answer specific questions, given some piece of information, such as an indicator or a time frame.  I've had other analysts send me Registry hive files and ask me to determine activity within a…
  • Talk Notes

    Harlan Carvey
    10 Apr 2015 | 7:58 am
    Thanks to Corey Harrell, I was watching the Intro to Large Scale Detection Hunting presentation from the NoLaSec meeting in Dec, 2014, and I started to have some thoughts about what was being said.  I looked at the comments field on YouTube, as well as on David's blog, but thought I would put my comments here instead, as it would give me an opportunity to structure them and build them out a bit before hitting the "send" button.First off, let me say that I thought the talk was really good.  I get that it was an intro talk, and that it wasn't going to cover anything in any…
  • add this feed to my.Alltop

    TaoSecurity

  • An Irrelevant Thesis

    Richard Bejtlich
    23 May 2015 | 9:40 am
    This week The Diplomat published an article by Dr Greg Austin titled What the US Gets Wrong About Chinese Cyberespionage. The subtitle teases the thesis: "Is it government policy in China to pass on commercial secrets obtained via cyberespionage to civil sector firms?" As you might expect (because it prompted me to write this post), the author's answer is "no."The following contains the argument:"Chinese actors may be particularly adept in certain stages of economic espionage, but it is almost certainly not Chinese government policy to allow the transfer of trade secrets collected by…
  • What Year Is This?

    Richard Bejtlich
    10 May 2015 | 12:07 pm
    I recently read a manuscript discussing computer crime and security. I've typed out several excerpts and published them below. Please read them and try to determine how recently this document was written.The first excerpt discusses the relationship between the computer and the criminal."The impersonality of the computer and the fact that it symbolizes for so many a system of uncaring power tend not only to incite efforts to strike back at the machine but also to provide certain people with a set of convenient rationalizations for engaging in fraud or embezzlement. The computer lends an…
  • The Need for Test Data

    Richard Bejtlich
    30 Apr 2015 | 2:22 pm
    Last week at the RSA Conference, I spoke to several vendors about their challenges offering products and services in the security arena. One mentioned a problem I had not heard before, but which made sense to me. The same topic will likely resonate with security researchers, academics, and developers.The vendor said that his company needed access to large amounts of realistic computing evidence to test and refine their product and service. For example, if a vendor develops software that inspects network traffic, it's important to have realistic network traffic on hand. The same is true of…
  • Will "Guaranteed Security" Save the Digital World?

    Richard Bejtlich
    28 Apr 2015 | 5:47 pm
    Thanks to a comment by Jeremiah Grossman on LinkedIn, I learned of his RSA talk No More Snake Oil: Why InfoSec Needs Security Guarantees. I thought his slide deck looked interesting and I wish I had seen the talk.One of his arguments is that security products and services lack guarantees, "unlike every day 'real world' products," as shown on slide 3 at left.The difference between the products at left and those protected by security products and services, however, is that security products and services are trying to counter intelligent, adaptive adversaries.Jeremiah does include a slide…
  • Example of Chinese Military Converging on US Military

    Richard Bejtlich
    13 Apr 2015 | 2:33 pm
    We often hear of vulnerabilities in the US military introduced by net-centric warfare and a reliance on communications network. As the Chinese military modernizes, it will introduce similar vulnerabilities.I found another example of this phenomenon courtesy of Chinascope:PLA Used its Online Purchasing Website for its First Online PurchaseWritten by LKY and AEF   Xinhua reported that on, April 7, the PLA announced that five manufacturers won the bidding, totaling 90 million yuan (US$14.48 million), to supply general and maintenance equipment to the PLA. The article said that these…
 
  • add this feed to my.Alltop

    digital forensics - Google News

  • ISU to house center studying forensic sciences - Ames Tribune

    26 May 2015 | 9:08 pm
    EurekAlertISU to house center studying forensic sciencesAmes TribuneThe center will study pattern evidence, including things like fingerprints, bite marks, blood splatter or shoe marks, and digital forensics, such as computer, video or audio analyses. “We hope to work with forensic practitioners, the people who work in Public Release: 26-May-2015 Iowa State to be home to a new, $20 million EurekAlert (press release)all 6 news articles »
  • Anoka County Sheriff's Office has state's first mobile digital forensics lab - Minneapolis Star Tribune

    26 May 2015 | 7:05 am
    Minneapolis Star TribuneAnoka County Sheriff's Office has state's first mobile digital forensics labMinneapolis Star TribuneThe Anoka County Sheriff's Office has a new tool to quickly gather digital evidence at crime scenes. The office converted an old ambulance — donated by Allina Emergency Medical Services — into the state's first mobile digital forensics lab. The
  • Gun, badge, laptop: Anoka deputies tap mobile tech to solve crimes - Minnesota Public Radio News

    19 May 2015 | 10:23 am
    Minnesota Public Radio NewsGun, badge, laptop: Anoka deputies tap mobile tech to solve crimesMinnesota Public Radio NewsInvestigator Pat O'Hara helped build this digital workstation to collect evidence from phone, tablets, computers and other technology at crime scenes. The Anoka County Sheriff's Office mobile digital forensics lab is the state's first. Tim Nelson | MPR
  • AccessData's FTK® Named Best Computer Forensic Solution at 2015 SC ... - Business Wire (press release)

    18 May 2015 | 7:20 am
    AccessData's FTK® Named Best Computer Forensic Solution at 2015 SC Business Wire (press release)“This prestigious award, which was based on the votes of experts in the field of information security, is an important third-party validation of the development work that has gone into FTK,” said Keith James, executive vice president of worldwide sales and more »
  • In-Q-Tel Invests in Digital Forensics Leader BlackBag Technologies - www.Officer.com

    13 May 2015 | 4:03 pm
    In-Q-Tel Invests in Digital Forensics Leader BlackBag Technologieswww.Officer.comSan Jose, California (PRWEB) May 07, 2015 - BlackBag Technologies, a leading provider of digital forensics software and training solutions, today announced a strategic investment and technology development agreement with In-Q-Tel (IQT), the investment ...
  • add this feed to my.Alltop

    Forensic Focus

  • Acquiring Windows PCs

    26 May 2015 | 10:21 am
    by Oleg Afonin, Danil Nikolaev and Yuri Gubanov In our previous article, we talked about acquiring tablets running Windows 8 and 8.1. In this publication, we will talk about the acquisition of Windows computers – desktops and laptops. This class of devices has their own share of surprises when it comes to acquisition. The obvious path of acquiring a Windows PC has always been “pull the plug, take the disk out, connect to an imaging device and collect evidence”. Sound familiar? Well, in today’s connected world things do not work quite like that. In this article, we will have a look at…
  • Interview with Philipp Amann, Senior Strategic Analyst, Europol

    26 May 2015 | 4:51 am
    Philipp, you presented a paper at DFRWS about robustness and resilience in digital forensics laboratories. Could you briefly outline your research for our readers? The main focus of our research is on identifying the key elements of resilience and robustness in digital forensics frameworks. In this paper, we aimed to identify the elements that allow an organization with digital forensic capabilities to adapt to change in a controlled and managed way; one of the main questions was how organisations can sustain their digital forensics capabilities and stay agile within controlled boundaries…
  • Webinar: Analyzing Evidence from Mobile Devices - Hidden and Deleted Data

    25 May 2015 | 7:07 am
    https://attendee.gotowebinar.com/register/6044973458626959618 Date: Tuesday May 26, 2015 Time: 7am PT/10am ET/2pm GMT/3pm BST Presenter: Tatiana Pankova, Marketing Manager, Oxygen Forensics Learn how to uncover a suspect or victim's activities with timeline, communication and location data. Discover how investigators can track user locations, build and map their historic routes, and clearly see all activities performed by the user at each location. Learn how to discover social connections between the users of multiple mobile devices and produce charts and tables revealing the user's closest…
  • Online Harassment A New Legal Concern

    25 May 2015 | 2:59 am
    Wood County Prosecutor Jason Wharton said computer crime related to harassment or abuse of individuals via social media is a developing and relatively new area of law. "As technology changes and the way people use that technology changes, legislatures must address whether amendments are necessary to address the technological changes," he said. Presently, as it relates to harassment or abuse of an individual, many of the remedies available to a victim are civil in nature. "There are, however, some limited contexts in which actions taken or statements made in social media may constitute a…
  • Unifying investigative teams from field to lab

    22 May 2015 | 7:11 am
    Nearly two-thirds of respondents to Cellebrite’s 2015 mobile forensics trends survey rated “important” the ability to extend mobile evidence collection capabilities into the field. The reasons are many: the costs of overtime, outsourcing, and even human errors are mounting, while lab service delivery times diminish. Improving investigators’ ability to make decisions about their cases, including whether they need to escalate mobile evidence to a forensic lab at all, is the focus for many organizations in both law enforcement and the private sector. This focus reflects a need for…
 
  • add this feed to my.Alltop

    (ISC)2 Blog

  • Comments from (ISC)² Leadership on CareFirst Breach

    (ISC)² Management
    22 May 2015 | 9:53 am
    If this breach follows the pattern of other health IT breaches as of late, then this type of intrusion at CareFirst wouldn’t be considered particularly difficult for an advanced team of malicious actors.  The main objective would be to steal a set or multiple sets of user credentials.  A juicy target would be an administrator or super user with high levels of access.  This could be done using malware from a spear phishing attack or a watering hole attack.  From there, the bad actors would actually be using legitimate user credentials to steal the data for which they…
  • On the Front Lines – (ISC)² Global Academic Program (GAP) Instructors are Shaping the Workforce of the Future – Introducing Derek A. Smith

    (ISC)² Management
    21 May 2015 | 1:16 pm
    (ISC)2 GAP Instructors bring a wealth of experience, wisdom and inspiration to students worldwide. They are the heartbeat of the program and have helped (ISC)2 become the world leader in cybersecurity education. They are helping us fulfill our mission to enhance the cybersecurity workforce through education and certification, one student at a time. But what makes them tick? What drives them to give so much back to the profession? What do they do when they’re not teaching? To give you a glimpse into their world and into the impact they’re having on the next generation, we’re going to…
  • U.S. Department of Defense Cyber Strategy: One of Five Strategic Goals to Building and Maintaining the Cyber Workforce

    (ISC)² Management
    19 May 2015 | 1:08 pm
    The U.S. Department of Defense (DoD) just released its new cybersecurity strategy report for 2015. This strategy sets five strategic goals: 1. Build and maintain ready forces and capabilities to conduct cyberspace operations;2. Defend the DoD information network, secure DoD data, and mitigate risks to DoD missions; 3. Be prepared to defend the U.S. homeland and U.S. vital interests from disruptive or destructive cyberattacks of significant consequence; 4. Build and maintain viable cyber options and plan to use those options to control conflict escalation and to shape the conflict environment…
  • (ISC)² Study: Workforce Shortfall Due to Hiring Difficulties Despite Rising Salaries, Increased Budgets and High Job Satisfaction Rate

    (ISC)² Management
    17 Apr 2015 | 6:52 am
    How can there be a workforce shortage in information security if global professionals are reporting rising salaries, increased budgets, high job satisfaction rates and low changes in employment status? The results of the seventh (ISC)² Global Information Security Workforce Study (GISWS) conducted by Frost & Sullivan for the (ISC)² Foundation with the support of Booz Allen Hamilton, Cyber 360 Solutions and NRI Secure Technologies reveal that the security of businesses is being threatened by reports of understaffed teams dealing with the complexity of multiple security technologies and…
  • (ISC)² Directors, Executives and Advisory Council Members Speaking at the RSA 2015 Conference

    (ISC)² Management
    15 Apr 2015 | 2:05 pm
    Don't miss the speaking sessions at next week's RSA Conference by members of the (ISC)² Board of Directors, Executive and Management Teams, (ISC)² Foundation, the (ISC)² Application Security Advisory Council and North America Advisory Council. Follow the discussions around some of these sessions on Twitter @ISC2 and #RSAC and Facebook /isc2fb. Also, don't forget to stop by our booth - #108 & 109. Monday, April 20Session Title: Status of the Industry: 2015 Global Information Security Workforce Study 9:00 a.m.-9:50 a.m./West/Room 3022 Status of the Industry: 2015 Global…
  • add this feed to my.Alltop

    Computer Forensics, Malware Analysis & Digital Investigations

  • EnCase v7 EnScript to check files to VirusTotal - Updated

    23 May 2015 | 9:06 am
    In October 2013, I wrote an EnScript that checked files that are tagged with the "VirusTotal" tag to VirusTotal. That original EnScript simply calculated the hash value of the tagged files and then sent it to VirusTotal for evaluation using their API. The original EnScript used an external EXE (VTBookmark.exe) that I wrote in C# to do the actual communication to the VirusTotal website.I have updated this EnScript to include the name of the detected malware that each AV product associates with the hash value.  I have also rewritten it to no longer require the external "VTBookmark.exe"…
  • CEIC 2015 - EnScripting for EnVestigators

    21 May 2015 | 8:00 am
    Below is a link to the slides from my presentation at CEIC 2015, as well as some example EnScripts.PPT slides Example EnScripts
  • EnCase v7 EnScript to create LEF based on condition

    10 May 2015 | 10:29 pm
    A reader recently asked if I could create an EnScript that would create a LEF based on a condition. Unfortunately, the reader wanted to use it with the free EnCase Imager program, which does not support creating LEFs or using the ConditionClass.However, I did create an EnScript that can be used with EnCase Forensic/Enterprise, which will create a LEF based on condition criteria that you can define.When run, the EnScript will ask for a location where to save the logical evidence file. The EnScript will initially assume the case default export folder unless set otherwise: The EnScript will…
  • EnCase v7 EnScript to Parse PST Email Metadata to Excel

    5 May 2015 | 9:04 pm
    A friend recently asked me for an easy way to export some of the common metadata from a PST file within EnCase. You can easily export data from the records view and even include columns that are not typically displayed by selecting the small down-arrow on the far right side and select the columns you want displayed:But he wanted a way to quickly show some of the common fields, including attachments, in a spreadsheet. This EnScript grabs some of the common fields and builds an Excel spreadsheet automatically:This EnScript requires Microsoft Excel be installed on the same computer where it is…
  • EnCase v7 EnScript to carve RecentFileCache.bcf data from selected file(s)

    1 Apr 2015 | 5:57 pm
    The following EnScript can be used to quickly search for and parse RecentFileCache data from memory images, unallocated space or the allocated RecentFileCache.bcf file.To use, simple blue check whatever file(s) you want to process, then run the EnScript.Output is to the console and bookmarks: c:\windows\system32\lsass.exec:\windows\system32\lsm.exec:\windows\system32\oobe\windeploy.exec:\windows\system32\sppsvc.exec:\windows\system32\winsat.exec:\windows\system32\rundll32.exec:\windows\system32\mcbuilder.exec:\windows\system32\winhost.exe…
  • add this feed to my.Alltop

    Secure Hunter Anti-Malware » Secure Hunter Blog

  • THE TRUTH: IRS ‘cyber-hack’ exposes 100,000 people whose identities were already stolen Secure Hunter

    shadmin
    26 May 2015 | 5:51 pm
    A new low for the Feds – or cyber-journalism? The latter The US Internal Revenue Service said on Tuesday that info including tax returns and income forms for some 100,000 people were illegally accessed this year.… The Register – Security Secure Hunter Anti -Malware The post THE TRUTH: IRS ‘cyber-hack’ exposes 100,000 people whose identities were already stolen Secure Hunter appeared first on Secure Hunter Anti-Malware.
  • Android ransomware poses as FBI smut warning Secure Hunter

    shadmin
    26 May 2015 | 5:50 am
    Call the cops! Erm, actually don’t Cybercrooks have launched a new wave of Android ransomware that poses as a pretty convincing FBI-imposed porn-surfing warning.… The Register – Security Secure Hunter Anti -Malware The post Android ransomware poses as FBI smut warning Secure Hunter appeared first on Secure Hunter Anti-Malware.
  • 2.8 million victims squared up by malicious Minecraft apps Secure Hunter

    shadmin
    25 May 2015 | 5:50 pm
    Cheaters cheated, then fleeced by premium SMS ‘malware’ removal tools ESET researcher Lukas Stefanko says a whopping 2.8 million users have downloaded malicious Minecraft Android applications.… The Register – Security Secure Hunter Anti -Malware The post 2.8 million victims squared up by malicious Minecraft apps Secure Hunter appeared first on Secure Hunter Anti-Malware.
  • Windows and OS X are malware, says Richard Stallman Secure Hunter

    shadmin
    25 May 2015 | 5:51 am
    ‘Resist gratification’, says says super-GNU-man freedom fighter Linux GNU firebrand Richard Stallman says Windows and Apple’s OS X are malware, Amazon is Orwellian, and anyone who trusts the internet-of-things is an ass.… The Register – Security Secure Hunter Anti -Malware The post Windows and OS X are malware, says Richard Stallman Secure Hunter appeared first on Secure Hunter Anti-Malware.
  • New relay selection fix for Tor to spoil spooks’ fun (eventually) Secure Hunter

    shadmin
    24 May 2015 | 5:51 pm
    Quick, before Skynet takes control of the Five Eyes Research by American and Israeli academics has lead to the development of Astoria, a new Tor client specifically designed to spoil spooks’ traffic analysis of the surveillance-dodging network.… The Register – Security Secure Hunter Anti -Malware The post New relay selection fix for Tor to spoil spooks’ fun (eventually) Secure Hunter appeared first on Secure Hunter Anti-Malware.
 
  • add this feed to my.Alltop

    Elvidence | Computer Forensics

  • Information Security Risks

    admin
    14 May 2015 | 6:02 am
    Digital technologies have touched almost every aspect of our life to some extent. Cloud, big data, mobile computing devices and social networking have profoundly changed the dynamics of the modern business. These technologies help us do our work more efficiently, enable businesses connect with genuine customers and deliver better, more personalised products or services. For organisations, the ability to quickly adapt to innovations and implement digital technology that enhances their productivity is a must in the current economic climate. At the same time organisations are being constantly…
  • Eavesdropping in the 21st Century

    admin
    28 Apr 2015 | 2:25 am
    Bugging, you might think, is the stuff of 1960s spy movies; microphones hidden in desk lamps and reel-to-reel tape recorders slowly turning in the next room. In fact it’s still very much a part of the modern world and our reliance on computers, mobile phones and other digital technology leaves us more open than ever to various types of eavesdropping. Whilst there are companies around that will help you detect conventional bugs like concealed microphones and hidden cameras, tracking down cyber-snooping is a much more specialist task. It involves technical surveillance countermeasures (TSCM)…
  • The Other Digital Divide

    admin
    6 Mar 2015 | 5:00 am
    We often hear public speakers talk about the digital divide. Usually they mean the sections of society that don’t have access to the Internet and therefore don’t get the best access to products and services via technology or are unable to find the best deals online. But there’s another digital divide too, between people who understand the technology they’re using and those who know just enough to get by. The latter group are able to use computers and mobile devices to carry out their daily tasks, but are likely to panic when something changes or doesn’t work as they expect. Digital…
  • Computer Forensic Services Explained

    admin
    13 Feb 2015 | 7:35 pm
    Elvidence provides a wide range of computer forensic services, ranging from data collection and analysis to computer hacking investigations and expert witness services. Whilst this type of work is often linked to gathering evidence for court cases it can have many other uses too. Here’s a look at some of what we can do for businesses and individuals. Computer Forensics There’s been a significant rise in the amount of computer and internet related crime in recent years. This is hardly surprising as we increasingly rely on computers and the internet to carry out transactions and…
  • The Information Security Challenges We’ll Face in 2015

    admin
    9 Jan 2015 | 8:42 pm
    Last year saw a number of high profile information security incidents. These ranged from targeted attacks on particular businesses, such as Sony, to vulnerabilities like Heartbleed that had the potential to affect a large part of the web. It would be naïve to think that we won’t see similar incidents in 2015. But what are the areas where we’re likely to see information security making the news this year? Insider Threats Whist there’s a popular image of hackers remotely attacking computer systems, often threats to businesses come from insiders who already have legitimate access to…
  • add this feed to my.Alltop

    Kessler International | Forensic Accounting, IP Protection, Cell Phone Forensics, Computer Forensics | RSS Feed

  • Beware of Patent Trolls

    ki-admin
    18 May 2015 | 7:24 am
    Intellectual Property And Patent Trolls If you are in the technology industry, a start-up company or podcaster, you may have heard of so-called patent trolls. These are not the trolls you’ve read about in fairy tales, but a very real threat to business. A patent troll is essentially a person or company that buys dubious patents from inventors or buys them at auctions from bankrupt companies and uses them to extract settlements from individuals or companies. They have become a legitimate threat by using constant allegations of infringement against intellectual property rights. A patent troll…
  • Digital Forensics Makes it Mainstream

    ki-admin
    15 May 2015 | 1:24 pm
    Digital Forensics Goes Hollywood Within any society there exists an element of criminal activity. As we continue to advance into the digital age our technology becomes more sophisticated. Unfortunately, so do the criminals. In a world where white collar crime is becoming more and more commonplace, digital forensics has found its way into the mainstream and on the big screen. Digital forensics is defined as the process of uncovering and interpreting electronic data for use in the court of law. In this day in age where people love courtroom dramas and anything digital, it’s no wonder why…
  • Kessler International to Exhibit At International Trademark Association’s 137th Annual Meeting

    ki-admin
    23 Apr 2015 | 10:46 am
    Next week, Kessler is headed to sunny San Diego, California for the International Trademark Association’s (INTA) 137th Annual Meeting. The meeting is scheduled to take place from May 2 through May 6 at the San Diego Convention Center. Over the course of these five days, exhibitors will experience brand strategy meetings, business development opportunities, and educational sessions. According to INTA, more than 9,500 trademark professionals from 150 countries have already registered for the event. Kessler International will be located at booths 2313 and 2315 within the exhibition space. As…
  • Cyber Evidence Gathering: Why Hiring Professionals is Important

    ki-admin
    21 Apr 2015 | 7:57 am
    Nearly everything that used to be done on paper is now done electronically. Books are now e-books, newspapers are now websites, and even paper currency has largely been replaced with debit cards and payment apps for smartphones. Along with all of these changes criminals have found new ways to steal money and information. Investigators can no longer follow a paper trail because there is no paper. It seems like it would be easier for criminals to hide their tracks in today’s electronic world. But it just takes a special kind of investigator to uncover a criminal’s tracks. Cyber Evidence…
  • Kessler Wins Forensic Accounting Firm of the Year

    ki-admin
    16 Apr 2015 | 9:27 am
    NEW YORK – Forensic investigative accounting firm Kessler International has been awarded Forensic Accounting Firm of the Year in the 2015 Corporate LiveWire M&A Awards. The Corporate LiveWire M&A Awards recognize achievement in the area of mergers and acquisitions, which is an integral step in the growth of many businesses. According to the Corporate LiveWire website, the awards are designed to “recognize those who have consistently proved to exceed industry standards and provide excellent advisory services, helping companies to navigate the challenges they face when undergoing…
Log in