Amateur Magicians at Work In our line of work, we see plenty of would-be magicians trying to make incriminating data…
Start with the Right Foundations Before diving into the types of data we can recover from smartphones, whether it’s an…
When “Corrupted Data” Doesn’t Quite Add Up Let’s dive into another interesting case from our files. This matter had already…
Shortly after beginning an investigation, once we’ve received and processed the evidence, one of the next big steps is getting…
We’ve talked plenty about the dangers of USB drives when it comes to data theft (and we’ll talk about them…
Once you’ve identified what potential evidence you have after an incident, here’s what to do next: 1. Secure the evidence…