Spotlight is Apple’s Mac OS X content indexing and search feature. Like any other desktop search technology, it is aimed at helping the user find files and folders on the computer. Mac Spotlight indexes all the files/folders on a volume, storing indexed metadata about filesystem objects to deliver rapid and widespread searching capabilities across the […]
Mac OS X Spotlight
Apple Unified Log (AUL)
Android Forensics – What Lawyers Should Know
As opposed to iPhone devices, Android phones are produced by a plethora of makers, brands and models, from very simple to high end devices, they share similar protection security measures when we are dealing with new devices or new Android OS versions. In fact, like iPhones, Android device content is encrypted and protected from being […]
Windows Shellbags
When a user changes the view mode or position of folders in the Windows graphic interface, the new view remains available because Windows remembers that information in the Windows Registry keys known as “Shellbags”. Perhaps more important, Shellbags store timestamps for some of the changes, making possible to determine access chronology. Like other Windows’ artifacts, […]
iPhone Forensics – What Lawyers Should Know
While the common procedure to forensically process a laptop or desktop involves an image of its data repositories (meaning the disk or disks where the information being handled by the device, including it OS, is stored), this is not the case when the device is a smartphone. Although in this post we address only iPhones, […]
Suspect Intellectual Property Theft?
Intellectual property pertains to the absconding of inventions, or creative processes, methods or expressions which vary from proprietary products and trade secrets. Normally, intellectual property (IP) theft using electronic means is achieved by transferring or copying the IP to portable devices or cloud repositories. For example, the thief may use his personal e-mail account, or […]
Windows Jump Lists
The Windows Operating System and some software applications offer functionality designed to optimize user experience and improve performance. One such feature is known as Jump Lists. Jump Lists were first seen with Windows 7 and were developed to facilitate access of frequently used files and folders – that is, to “jump” to recently opened objects. […]
Digital Forensics in the COVID-19 Era
According to LogikCull’s “2021 Corporate In-Housing Survey”, encompassing feedback from 60 plus organizations on COVID-19’s impact on the legal industry, only 11% of respondents expect work to return to normal shortly after a vaccine is widely available, while 89% see changes extending for the near future (39%) or becoming permanent (50%). As a result of […]
Essential Artifacts Source: USB Devices
One of the key elements in the forensics analysis triage is dealing with USB inserted devices. The importance of uncovering artifacts associated with inserted USB devices is simple: it’s one of the most common, quickest and easiest means of stealing company intellectual property. Moreover, because the user doesn’t need to login to any system, e.g., […]
Handling A Former Employee’s Computer
Theft of IP matters against former employees, and wrongful termination lawsuits have something in common: the former employee’s computer will likely have valuable evidence. Unfortunately most of the time the computers will be re-imaged (software reloaded) and put back into production for the new hire. HR policies regarding exiting employees should consider the potential loss […]
Mac OS X Spotlight
Apple Unified Log (AUL)
Android Forensics – What Lawyers Should Know
As opposed to iPhone devices, Android phones are produced by a plethora of makers, brands and models, from very simple to high end devices, they share similar protection security measures when we are dealing with new devices or new Android OS versions. In fact, like iPhones, Android device content is encrypted and protected from being […]
Windows Shellbags
When a user changes the view mode or position of folders in the Windows graphic interface, the new view remains available because Windows remembers that information in the Windows Registry keys known as “Shellbags”. Perhaps more important, Shellbags store timestamps for some of the changes, making possible to determine access chronology. Like other Windows’ artifacts, […]
iPhone Forensics – What Lawyers Should Know
While the common procedure to forensically process a laptop or desktop involves an image of its data repositories (meaning the disk or disks where the information being handled by the device, including it OS, is stored), this is not the case when the device is a smartphone. Although in this post we address only iPhones, […]
Suspect Intellectual Property Theft?
Intellectual property pertains to the absconding of inventions, or creative processes, methods or expressions which vary from proprietary products and trade secrets. Normally, intellectual property (IP) theft using electronic means is achieved by transferring or copying the IP to portable devices or cloud repositories. For example, the thief may use his personal e-mail account, or […]
Windows Jump Lists
The Windows Operating System and some software applications offer functionality designed to optimize user experience and improve performance. One such feature is known as Jump Lists. Jump Lists were first seen with Windows 7 and were developed to facilitate access of frequently used files and folders – that is, to “jump” to recently opened objects. […]
Digital Forensics in the COVID-19 Era
According to LogikCull’s “2021 Corporate In-Housing Survey”, encompassing feedback from 60 plus organizations on COVID-19’s impact on the legal industry, only 11% of respondents expect work to return to normal shortly after a vaccine is widely available, while 89% see changes extending for the near future (39%) or becoming permanent (50%). As a result of […]
Essential Artifacts Source: USB Devices
One of the key elements in the forensics analysis triage is dealing with USB inserted devices. The importance of uncovering artifacts associated with inserted USB devices is simple: it’s one of the most common, quickest and easiest means of stealing company intellectual property. Moreover, because the user doesn’t need to login to any system, e.g., […]
Handling A Former Employee’s Computer
Theft of IP matters against former employees, and wrongful termination lawsuits have something in common: the former employee’s computer will likely have valuable evidence. Unfortunately most of the time the computers will be re-imaged (software reloaded) and put back into production for the new hire. HR policies regarding exiting employees should consider the potential loss […]
Apple Unified Log (AUL)
Android Forensics – What Lawyers Should Know
As opposed to iPhone devices, Android phones are produced by a plethora of makers, brands and models, from very simple to high end devices, they share similar protection security measures when we are dealing with new devices or new Android OS versions. In fact, like iPhones, Android device content is encrypted and protected from being […]
Windows Shellbags
When a user changes the view mode or position of folders in the Windows graphic interface, the new view remains available because Windows remembers that information in the Windows Registry keys known as “Shellbags”. Perhaps more important, Shellbags store timestamps for some of the changes, making possible to determine access chronology. Like other Windows’ artifacts, […]
iPhone Forensics – What Lawyers Should Know
While the common procedure to forensically process a laptop or desktop involves an image of its data repositories (meaning the disk or disks where the information being handled by the device, including it OS, is stored), this is not the case when the device is a smartphone. Although in this post we address only iPhones, […]
Suspect Intellectual Property Theft?
Intellectual property pertains to the absconding of inventions, or creative processes, methods or expressions which vary from proprietary products and trade secrets. Normally, intellectual property (IP) theft using electronic means is achieved by transferring or copying the IP to portable devices or cloud repositories. For example, the thief may use his personal e-mail account, or […]
Windows Jump Lists
The Windows Operating System and some software applications offer functionality designed to optimize user experience and improve performance. One such feature is known as Jump Lists. Jump Lists were first seen with Windows 7 and were developed to facilitate access of frequently used files and folders – that is, to “jump” to recently opened objects. […]
Digital Forensics in the COVID-19 Era
According to LogikCull’s “2021 Corporate In-Housing Survey”, encompassing feedback from 60 plus organizations on COVID-19’s impact on the legal industry, only 11% of respondents expect work to return to normal shortly after a vaccine is widely available, while 89% see changes extending for the near future (39%) or becoming permanent (50%). As a result of […]
Essential Artifacts Source: USB Devices
One of the key elements in the forensics analysis triage is dealing with USB inserted devices. The importance of uncovering artifacts associated with inserted USB devices is simple: it’s one of the most common, quickest and easiest means of stealing company intellectual property. Moreover, because the user doesn’t need to login to any system, e.g., […]
Handling A Former Employee’s Computer
Theft of IP matters against former employees, and wrongful termination lawsuits have something in common: the former employee’s computer will likely have valuable evidence. Unfortunately most of the time the computers will be re-imaged (software reloaded) and put back into production for the new hire. HR policies regarding exiting employees should consider the potential loss […]
Android Forensics – What Lawyers Should Know
As opposed to iPhone devices, Android phones are produced by a plethora of makers, brands and models, from very simple to high end devices, they share similar protection security measures when we are dealing with new devices or new Android OS versions. In fact, like iPhones, Android device content is encrypted and protected from being […]
Windows Shellbags
When a user changes the view mode or position of folders in the Windows graphic interface, the new view remains available because Windows remembers that information in the Windows Registry keys known as “Shellbags”. Perhaps more important, Shellbags store timestamps for some of the changes, making possible to determine access chronology. Like other Windows’ artifacts, […]
iPhone Forensics – What Lawyers Should Know
While the common procedure to forensically process a laptop or desktop involves an image of its data repositories (meaning the disk or disks where the information being handled by the device, including it OS, is stored), this is not the case when the device is a smartphone. Although in this post we address only iPhones, […]
Suspect Intellectual Property Theft?
Intellectual property pertains to the absconding of inventions, or creative processes, methods or expressions which vary from proprietary products and trade secrets. Normally, intellectual property (IP) theft using electronic means is achieved by transferring or copying the IP to portable devices or cloud repositories. For example, the thief may use his personal e-mail account, or […]
Windows Jump Lists
The Windows Operating System and some software applications offer functionality designed to optimize user experience and improve performance. One such feature is known as Jump Lists. Jump Lists were first seen with Windows 7 and were developed to facilitate access of frequently used files and folders – that is, to “jump” to recently opened objects. […]
Digital Forensics in the COVID-19 Era
According to LogikCull’s “2021 Corporate In-Housing Survey”, encompassing feedback from 60 plus organizations on COVID-19’s impact on the legal industry, only 11% of respondents expect work to return to normal shortly after a vaccine is widely available, while 89% see changes extending for the near future (39%) or becoming permanent (50%). As a result of […]
Essential Artifacts Source: USB Devices
One of the key elements in the forensics analysis triage is dealing with USB inserted devices. The importance of uncovering artifacts associated with inserted USB devices is simple: it’s one of the most common, quickest and easiest means of stealing company intellectual property. Moreover, because the user doesn’t need to login to any system, e.g., […]
Handling A Former Employee’s Computer
Theft of IP matters against former employees, and wrongful termination lawsuits have something in common: the former employee’s computer will likely have valuable evidence. Unfortunately most of the time the computers will be re-imaged (software reloaded) and put back into production for the new hire. HR policies regarding exiting employees should consider the potential loss […]
Windows Shellbags
When a user changes the view mode or position of folders in the Windows graphic interface, the new view remains available because Windows remembers that information in the Windows Registry keys known as “Shellbags”. Perhaps more important, Shellbags store timestamps for some of the changes, making possible to determine access chronology. Like other Windows’ artifacts, […]
iPhone Forensics – What Lawyers Should Know
While the common procedure to forensically process a laptop or desktop involves an image of its data repositories (meaning the disk or disks where the information being handled by the device, including it OS, is stored), this is not the case when the device is a smartphone. Although in this post we address only iPhones, […]
Suspect Intellectual Property Theft?
Intellectual property pertains to the absconding of inventions, or creative processes, methods or expressions which vary from proprietary products and trade secrets. Normally, intellectual property (IP) theft using electronic means is achieved by transferring or copying the IP to portable devices or cloud repositories. For example, the thief may use his personal e-mail account, or […]
Windows Jump Lists
The Windows Operating System and some software applications offer functionality designed to optimize user experience and improve performance. One such feature is known as Jump Lists. Jump Lists were first seen with Windows 7 and were developed to facilitate access of frequently used files and folders – that is, to “jump” to recently opened objects. […]
Digital Forensics in the COVID-19 Era
According to LogikCull’s “2021 Corporate In-Housing Survey”, encompassing feedback from 60 plus organizations on COVID-19’s impact on the legal industry, only 11% of respondents expect work to return to normal shortly after a vaccine is widely available, while 89% see changes extending for the near future (39%) or becoming permanent (50%). As a result of […]
Essential Artifacts Source: USB Devices
One of the key elements in the forensics analysis triage is dealing with USB inserted devices. The importance of uncovering artifacts associated with inserted USB devices is simple: it’s one of the most common, quickest and easiest means of stealing company intellectual property. Moreover, because the user doesn’t need to login to any system, e.g., […]
Handling A Former Employee’s Computer
Theft of IP matters against former employees, and wrongful termination lawsuits have something in common: the former employee’s computer will likely have valuable evidence. Unfortunately most of the time the computers will be re-imaged (software reloaded) and put back into production for the new hire. HR policies regarding exiting employees should consider the potential loss […]
iPhone Forensics – What Lawyers Should Know
While the common procedure to forensically process a laptop or desktop involves an image of its data repositories (meaning the disk or disks where the information being handled by the device, including it OS, is stored), this is not the case when the device is a smartphone. Although in this post we address only iPhones, […]
Suspect Intellectual Property Theft?
Suspect Intellectual Property Theft?
Intellectual property pertains to the absconding of inventions, or creative processes, methods or expressions which vary from proprietary products and trade secrets. Normally, intellectual property (IP) theft using electronic means is achieved by transferring or copying the IP to portable devices or cloud repositories. For example, the thief may use his personal e-mail account, or […]
Windows Jump Lists
Windows Jump Lists
The Windows Operating System and some software applications offer functionality designed to optimize user experience and improve performance. One such feature is known as Jump Lists. Jump Lists were first seen with Windows 7 and were developed to facilitate access of frequently used files and folders – that is, to “jump” to recently opened objects. […]
Digital Forensics in the COVID-19 Era
Digital Forensics in the COVID-19 Era
According to LogikCull’s “2021 Corporate In-Housing Survey”, encompassing feedback from 60 plus organizations on COVID-19’s impact on the legal industry, only 11% of respondents expect work to return to normal shortly after a vaccine is widely available, while 89% see changes extending for the near future (39%) or becoming permanent (50%). As a result of […]
Essential Artifacts Source: USB Devices
Essential Artifacts Source: USB Devices
One of the key elements in the forensics analysis triage is dealing with USB inserted devices. The importance of uncovering artifacts associated with inserted USB devices is simple: it’s one of the most common, quickest and easiest means of stealing company intellectual property. Moreover, because the user doesn’t need to login to any system, e.g., […]
Handling A Former Employee’s Computer
Handling A Former Employee’s Computer
Theft of IP matters against former employees, and wrongful termination lawsuits have something in common: the former employee’s computer will likely have valuable evidence. Unfortunately most of the time the computers will be re-imaged (software reloaded) and put back into production for the new hire. HR policies regarding exiting employees should consider the potential loss […]