For years, digital forensics on Macs looked a lot like working with Windows machines: power down the computer, connect it…
In the digital world, evidence doesn’t typically disappear by accident. Increasingly, individuals and organizations use deliberate methods to hide, alter,…
When it comes to retrieving electronically stored information (ESI) for compliance, litigation, or internal investigations, there’s more than one way to get…
When “Corrupted Data” Doesn’t Quite Add Up Let’s dive into another interesting case from our files. This matter had already…
Shortly after beginning an investigation, once we’ve received and processed the evidence, one of the next big steps is getting…
So you’ve taken the right steps. You’ve secured the device, created a forensic image, and confirmed its authenticity by verifying…





