digital forensic analysis

Dirty Little Secrets Hidden on Cell Phones

Some people are very protective of their information on the cellular devices. In many cases, marriages end by them. I’m not talking about too much texting or surfing, I’m referring to those secret texts and emails, along with photos. If your spouse is hiding his or her phone from you, or has it password protected and you can’t gain access to it, there is a reason. Either they are required if it is an employer issued device or they are hiding something they just don’t want you to see.

Let’s say you get access to their phone, you even have done some private investigation and learned their passcode and you still don’t see anything incriminating on the phone, but you know they are up to [...]

Computer Forensics - A Powerful Tool in Investigations

Long before there were computers, internet connection and mobile phones, words were written by hand, pen/pencil and paper. If you made a mistake you would wad up the paper, throw it in the trash and start all over again, or use your trusty eraser and change the wording. Or you could use your “typewriter” and type a letter, same applied, if you made a mistake you would rip the paper out, roll in a new sheet and start all over. And if you had to research anything, you headed off to the library and conducted manual searches. If you didn’t check out a book, no one knew that you even opened up a book or copied the information.

What you did on pen and paper [...]

Are You Sabotaging Your Own Business’s Digital Security?

You wouldn’t be the first business owner to use their work email address for non business related tasks. Sometimes it might make sense to use your business email account during online orders, quote applications, etc. However, this might not be the smartest move. When you send an email anywhere the email will move through various networks. If the company your dealing with has lax daisy network security system you could in fact be asking for malware to be directed right back at your own network via email responses.

There are other scenarios to consider as well. How many users and what type of privileges to the users on the business network have? Can they also send emails and if so are the emails monitored? If [...]