by John Troxel | Jun 7, 2023 | Blogs
Text messages can hold crucial evidence that can make or break a case, and the deletion of these messages can pose a significant challenge. But fear not, fellow professionals! This blog aims to educate on recovering deleted text messages, shedding light on the methods...
by John Troxel | Apr 26, 2023 | Blogs
iCloud Forensics: Ignore at Your Own Risk As the use of cloud-based storage and services continues to grow, forensic analysis of cloud data has become critical, including for iCloud, Apple’s cloud storage service. With over a billion active Apple devices, iCloud’s...
by John Troxel | Mar 29, 2023 | Blogs
In the Gwyneth Paltrow court case, the management and authentication of social media evidence was shown to be, um, challenging? From a computer forensics perspective, what a screw up. In fact, technical skills were not required to let the cat out of the bag here. The...
by John Troxel | Mar 24, 2022 | Blogs
One of my favorite things to read is Craig Ball’s writings at Ball in Your Court. I have hit Craig up in the past as he has a unique perspective as an expert in computer forensics, e-Discovery and is a lawyer. He has been super helpful, and I can’t...
by John Troxel | Mar 30, 2021 | Blogs
The word is out: insurance companies pay ransoms to cyber criminals. There is no “we don’t negotiate with terrorists” line drawn in the sand. Cyber security is breached, cyber criminals take over mission critical data, and insurers pay out on their cyber insurance...