Tags » Computer Forensics

A List of small workplace investigation blunders that result in major losses

A major complaint has come up against an employee at your company? What will you do? I guess you would try to resolve the conflict with some professional help. 283 more words

Computer Forensics

Don’t Forget the Victim (And Their Device)!

May 13, 2016

Don’t Forget the Victim (And Their Device)!

Regardless if your case involves computers, tablets, iPhones, Android devices or all of the above, one thing the investigative community can agree on is, every case is different.  1,015 more words

Digital Forensics

Post Term Thoughts: My Study of Cyber Crime and Computer Forensics

I’m pleased to say that I’ve recently wrapped up my study of Cyber Crime and Computer Forensics with SUNY Empire State College.  It was a rewarding experience.  333 more words

Empire State College

SSD and eMMC Forensics 2016 – Part 2

What Has Changed in 2016 in the Way SSD Drives Self-Destruct Evidence. Demystifying eMMC, M.2, NVMe, and PCI-E.

by Yuri Gubanov, Oleg Afonin
© Belkasoft Research 2016… 1,465 more words

Research

EDna: Still Cheap and Challenged

About seven years ago, I e-mailed a hypothetical to colleagues seeking their advice about how to process and review an unprepossessing volume of ESI for production in e-discovery.  440 more words

E-Discovery

Training Review: X-Ways Forensics

April 15, 2016

Training Review: X-Ways Forensics

I’ve been involved in computer/digital forensics since 2009, starting off my first training with Basic Data Recovery & Acquisition (BDRA) given by the… 2,318 more words

Digital Forensics

Collecting Volatile and Non-volatile Data

Volatile Data : 

Volatile data is stored in memory of a live system (or in transit on a data bus) and would be lost when the system was powered down. 1,226 more words

Computer Forensics