Malware Forensics

Malware Forensics

Malware Forensics What it is: Malware is software that is intentionally designed to disrupt, damage, or gain unauthorized access to a computer system. A considerable amount of computer intrusions involve some form of malicious software on the victim’s computer....
Don’t Overlook the Significance of AirDrop Logs in iOS Analysis

Don’t Overlook the Significance of AirDrop Logs in iOS Analysis

Don’t Overlook the Significance of AirDrop Logs in iOS Analysis   A client once came to me with a concern for his privacy, as he started receiving his own private photos sent to him from a friend that he had a falling-out with. He did not know how his ex-friend...
Fitness Tracking Apps: Building a “Healthier” Case

Fitness Tracking Apps: Building a “Healthier” Case

Fitness tracking apps: Building a “Healthier” Case Fitness tracking applications are becoming more and more popular as the technology gets cheaper and more advanced. In 2018, Fitbit was estimated to have more than 27 million users who use their app at least once a...
Beyond Text Messages

Beyond Text Messages

Beyond Text Messages The various forms of chat communications. On a mobile device or computer, communications can exist across a variety of applications; IM and text messages are just the start of the potentially-relevant user messages. People hold conversations...
Internet-of-Things (IoT), Game Consoles, and Other Devices

Internet-of-Things (IoT), Game Consoles, and Other Devices

Internet-of-Things (IoT), Game Consoles, and Other Devices Using non-traditional sources of digital evidence in litigation. The digital forensics field grows as fast as technology does. In modern litigation, there is a vast array of digital evidence beyond cell phones...