Skip to content

Digital Forensic Process—Presentation

By John Ahearne, Forensic Analyst   This article is part of a series that delves into each step of the digital forensic process. If you missed one of the previous articles, you can read them at the links below: Introduction Identification Preservation/Collection Analysis In this article, we outline certain digital…

Legal Email Collection

When collecting email evidence for use in litigation, whether it’s criminal or civil in nature, it is imperative that emails be obtained in a lawful, repeatable and defensible manner. If they are not, they may not be admissible in court. Obtaining Emails for Criminal Investigations There are three legal methods…

Digital Forensic Process—Analysis

By John Ahearne, Forensic Analyst This article is part of a series that delves into each step of the digital forensic process. If you missed one of the previous articles, you can read them at the links below: Introduction Identification Preservation/Collection Analysis of Digital Evidence Forensic digital analysis is the…

DVR Examiner User Certification

User Certification Course 3 Day Course December 5-7, 2017 9:00–5:00 DriveSavers, Inc. 400 Bel Marin Keys Blvd. Novato, CA 94949 What is DVR Examiner? DVR Examiner is a software solution for acquiring video and metadata from CCTV DVRs in a forensically sound manner. DVR Examiner eliminates time consuming export processes,…

Press Release: DriveSavers Meets New SSAE 18 Security Standards

Leader in data recovery, eDiscovery, digital forensics addresses SSAE 18 SOC2 Type II guidelines. DriveSavers, the worldwide leader in data recovery, eDiscovery and digital forensics, announces compliance with new data security requirements added to Standards Organization Controls (SOC) 1 and 2. The American Institute of Certified Public Accountants (AICPA) recently…

Legal Technology Moves Into “IoT” Territory

By Bob Mehr, Sr. Legal Services Advisor Technology is changing today’s legal landscape as courts grapple with a wave of electronic evidence coming from places and things that connect to the Internet. This new evidence is from sources we never imagined would be admissible, including smartphones, doorbells, virtual assistants and…

Petya/ExPetr was Data Killer, Not Ransomware

By Michael Hall, Chief Information Security Officer The malware attack that started in Eastern Europe in late June and quickly spread around the globe looks like it was not a ransom attack at all, but an all-out effort to destroy data, according to a security company that examined the program’s…

Ransomware Takes a New Turn—How WannaCry was Different

By Michael Hall, Chief Information Security Officer Last month, the ransomware known as WannaCry spread through the world at an astonishing rate, attacking hundreds of thousands of computers literally overnight and holding their data for ransom. In 2016, ransomware cost its victims approximately $1 billion. That’s $1 billion for all…

Digital Forensic Process—Preservation / Collection

By John Ahearne, Forensic Analyst This article is part of a series that delves into each step of the digital forensic process. If you missed one of the previous articles, you can read them at the links below: Digital Forensic Process—Introduction Digital Forensic Process—Identification Handling Digital Evidence Handling of evidence…

Back To Top
Search