Apple Unified Log (AUL)
Android Forensics – What Lawyers Should Know
As opposed to iPhone devices, Android phones are produced by a plethora of makers, brands and models, from very simple to high end devices, they share similar protection security measures when we are dealing with new devices or new Android OS versions. In fact, like iPhones, Android device content is encrypted and protected from being […]
Windows Shellbags
When a user changes the view mode or position of folders in the Windows graphic interface, the new view remains available because Windows remembers that information in the Windows Registry keys known as “Shellbags”. Perhaps more important, Shellbags store timestamps for some of the changes, making possible to determine access chronology. Like other Windows’ artifacts, […]
Together HR and IT can strengthen the most important wall: The HUMAN FIREWALL
With all the talk about walls, we forget the most important one for every business: The Human Firewall. What is this Human Firewall? It’s comprised of each and every employee or contractor who works within your network and who is being targeted by dedicated nefarious hackers to get access to your bank account or intellectual […]
Essential Artifacts Source: USB Devices
One of the key elements in the forensics analysis triage is dealing with USB inserted devices. The importance of uncovering artifacts associated with inserted USB devices is simple: it’s one of the most common, quickest and easiest means of stealing company intellectual property. Moreover, because the user doesn’t need to login to any system, e.g., […]
Solid-State Drives = Reduced Forensics Costs
Newer desktops and laptops are coming standard with solid-state drives (SSD). Solid-state drives are computer storage devices that differ greatly from hard disk drives (HDD), which have moving mechanical parts. Solid-state drives contain integrated circuits, similar to the architecture of USB flash drives. Although SSDs are pricier than HDDs, the advantages are numerous: 1) speed […]
Cyber Security Partnerships
Companies are increasingly budgeting for employee cyber security training and awareness with an emphasis on detecting and responding to social engineering and spear phishing attacks. As businesses mitigate against new threats, there is always the question of whether or not their trading partners are adequately protected. Some concerns include: a) is there an information security […]
Handling A Former Employee’s Computer
Theft of IP matters against former employees, and wrongful termination lawsuits have something in common: the former employee’s computer will likely have valuable evidence. Unfortunately most of the time the computers will be re-imaged (software reloaded) and put back into production for the new hire. HR policies regarding exiting employees should consider the potential loss […]
Apple Unified Log (AUL)
Android Forensics – What Lawyers Should Know
As opposed to iPhone devices, Android phones are produced by a plethora of makers, brands and models, from very simple to high end devices, they share similar protection security measures when we are dealing with new devices or new Android OS versions. In fact, like iPhones, Android device content is encrypted and protected from being […]
Windows Shellbags
When a user changes the view mode or position of folders in the Windows graphic interface, the new view remains available because Windows remembers that information in the Windows Registry keys known as “Shellbags”. Perhaps more important, Shellbags store timestamps for some of the changes, making possible to determine access chronology. Like other Windows’ artifacts, […]
Together HR and IT can strengthen the most important wall: The HUMAN FIREWALL
With all the talk about walls, we forget the most important one for every business: The Human Firewall. What is this Human Firewall? It’s comprised of each and every employee or contractor who works within your network and who is being targeted by dedicated nefarious hackers to get access to your bank account or intellectual […]
Essential Artifacts Source: USB Devices
One of the key elements in the forensics analysis triage is dealing with USB inserted devices. The importance of uncovering artifacts associated with inserted USB devices is simple: it’s one of the most common, quickest and easiest means of stealing company intellectual property. Moreover, because the user doesn’t need to login to any system, e.g., […]
Solid-State Drives = Reduced Forensics Costs
Newer desktops and laptops are coming standard with solid-state drives (SSD). Solid-state drives are computer storage devices that differ greatly from hard disk drives (HDD), which have moving mechanical parts. Solid-state drives contain integrated circuits, similar to the architecture of USB flash drives. Although SSDs are pricier than HDDs, the advantages are numerous: 1) speed […]
Cyber Security Partnerships
Companies are increasingly budgeting for employee cyber security training and awareness with an emphasis on detecting and responding to social engineering and spear phishing attacks. As businesses mitigate against new threats, there is always the question of whether or not their trading partners are adequately protected. Some concerns include: a) is there an information security […]
Handling A Former Employee’s Computer
Theft of IP matters against former employees, and wrongful termination lawsuits have something in common: the former employee’s computer will likely have valuable evidence. Unfortunately most of the time the computers will be re-imaged (software reloaded) and put back into production for the new hire. HR policies regarding exiting employees should consider the potential loss […]
Android Forensics – What Lawyers Should Know
As opposed to iPhone devices, Android phones are produced by a plethora of makers, brands and models, from very simple to high end devices, they share similar protection security measures when we are dealing with new devices or new Android OS versions. In fact, like iPhones, Android device content is encrypted and protected from being […]
Windows Shellbags
When a user changes the view mode or position of folders in the Windows graphic interface, the new view remains available because Windows remembers that information in the Windows Registry keys known as “Shellbags”. Perhaps more important, Shellbags store timestamps for some of the changes, making possible to determine access chronology. Like other Windows’ artifacts, […]
Together HR and IT can strengthen the most important wall: The HUMAN FIREWALL
With all the talk about walls, we forget the most important one for every business: The Human Firewall. What is this Human Firewall? It’s comprised of each and every employee or contractor who works within your network and who is being targeted by dedicated nefarious hackers to get access to your bank account or intellectual […]
Essential Artifacts Source: USB Devices
One of the key elements in the forensics analysis triage is dealing with USB inserted devices. The importance of uncovering artifacts associated with inserted USB devices is simple: it’s one of the most common, quickest and easiest means of stealing company intellectual property. Moreover, because the user doesn’t need to login to any system, e.g., […]
Solid-State Drives = Reduced Forensics Costs
Newer desktops and laptops are coming standard with solid-state drives (SSD). Solid-state drives are computer storage devices that differ greatly from hard disk drives (HDD), which have moving mechanical parts. Solid-state drives contain integrated circuits, similar to the architecture of USB flash drives. Although SSDs are pricier than HDDs, the advantages are numerous: 1) speed […]
Cyber Security Partnerships
Companies are increasingly budgeting for employee cyber security training and awareness with an emphasis on detecting and responding to social engineering and spear phishing attacks. As businesses mitigate against new threats, there is always the question of whether or not their trading partners are adequately protected. Some concerns include: a) is there an information security […]
Handling A Former Employee’s Computer
Theft of IP matters against former employees, and wrongful termination lawsuits have something in common: the former employee’s computer will likely have valuable evidence. Unfortunately most of the time the computers will be re-imaged (software reloaded) and put back into production for the new hire. HR policies regarding exiting employees should consider the potential loss […]
Windows Shellbags
When a user changes the view mode or position of folders in the Windows graphic interface, the new view remains available because Windows remembers that information in the Windows Registry keys known as “Shellbags”. Perhaps more important, Shellbags store timestamps for some of the changes, making possible to determine access chronology. Like other Windows’ artifacts, […]
Together HR and IT can strengthen the most important wall: The HUMAN FIREWALL
Together HR and IT can strengthen the most important wall: The HUMAN FIREWALL
With all the talk about walls, we forget the most important one for every business: The Human Firewall. What is this Human Firewall? It’s comprised of each and every employee or contractor who works within your network and who is being targeted by dedicated nefarious hackers to get access to your bank account or intellectual […]
Essential Artifacts Source: USB Devices
Essential Artifacts Source: USB Devices
One of the key elements in the forensics analysis triage is dealing with USB inserted devices. The importance of uncovering artifacts associated with inserted USB devices is simple: it’s one of the most common, quickest and easiest means of stealing company intellectual property. Moreover, because the user doesn’t need to login to any system, e.g., […]
Solid-State Drives = Reduced Forensics Costs
Solid-State Drives = Reduced Forensics Costs
Newer desktops and laptops are coming standard with solid-state drives (SSD). Solid-state drives are computer storage devices that differ greatly from hard disk drives (HDD), which have moving mechanical parts. Solid-state drives contain integrated circuits, similar to the architecture of USB flash drives. Although SSDs are pricier than HDDs, the advantages are numerous: 1) speed […]
Cyber Security Partnerships
Cyber Security Partnerships
Companies are increasingly budgeting for employee cyber security training and awareness with an emphasis on detecting and responding to social engineering and spear phishing attacks. As businesses mitigate against new threats, there is always the question of whether or not their trading partners are adequately protected. Some concerns include: a) is there an information security […]
Handling A Former Employee’s Computer
Handling A Former Employee’s Computer
Theft of IP matters against former employees, and wrongful termination lawsuits have something in common: the former employee’s computer will likely have valuable evidence. Unfortunately most of the time the computers will be re-imaged (software reloaded) and put back into production for the new hire. HR policies regarding exiting employees should consider the potential loss […]