Blog

Cool Stuff Happening

We have the best job in the world! And occasionally we get to share some of the sordid details, as well as provide some other useful tidbits our clients will find useful.

Protecting Information Assets with Multi-factor Authentication

Protecting Information Assets with Multi-factor Authentication

The word is out: insurance companies pay ransoms to cyber criminals. There is no “we don’t negotiate with terrorists” line drawn in the sand. Cyber security is breached, cyber criminals take over mission critical data, and insurers pay out on their cyber insurance...

Phones and Sweeps

Phones and Sweeps

Do you really need to spend around $1000 on a cell phone exam?   Maybe! If you are planning on capturing evidence that could show up in court, then yeah . . . get an analyst who uses a professional tool (aka really expensive) like Cellebrite to acquire and preserve...

Remote Collections

Remote Collections

What a pain this virus situation has been! But we've been able to figure out how to best serve our clients' computer forensic needs by doing things remotely.   Cell Phones We have the ability to install an instance of Cellebrite on a distant Windows computer, as...

Checkm8!

Checkm8!

iPhone's can yield more info now with Checkm8. This is an exploit intended for iPhone X and earlier which gets a TON of info that we were not able to get before, and not everyone is using an XR, XS or 11. Yet. Industrial strength forensic apps like Cellebrite have...

Computer Forensics Case: Former Employee

Computer Forensics Case: Former Employee

Our client's former employee indicated he never exchanged text messages with certain customers after his termination. A cell phone analysis of the subject's iPhone’s messages supported his assertion, no messages between him and any customers were found. But evidence...