In the digital world, evidence doesn’t typically disappear by accident. Increasingly, individuals and organizations use deliberate methods to hide, alter,…
When people think of data theft or insider threats, they imagine elaborate hacking or high-tech espionage. But often, the most…
Amateur Magicians at Work In our line of work, we see plenty of would-be magicians trying to make incriminating data…
Start with the Right Foundations Before diving into the types of data we can recover from smartphones, whether it’s an…
When “Corrupted Data” Doesn’t Quite Add Up Let’s dive into another interesting case from our files. This matter had already…
Shortly after beginning an investigation, once we’ve received and processed the evidence, one of the next big steps is getting…





