Digital Forensics & Cyber Security Blog
Digital Forensics & Cyber Security Blog
Advanced Digital Mobile Forensic Technologies
Advanced mobile device and smartphone forensics involves finding and recovering data stored in the device’s memory component, typically a chip or chips located on the devices motherboard or system board. Using specialized equipment and employing skilled processes we find the data by using test points, jolts of electricity, and dedicated [...]
Employees fired from Google, Facebook, Microsoft, Ring, Apple, and other companies for Data Misuse
Once again we ask, "Who has access to your data?" Google fired 80 employees for abusing user data and spying on people, with some even sharing personal information outside the company, a new report says. In some cases, according to the report, some Google employees spied on other employees using [...]
Best Backup Strategy and Practices to Protect Your Data
What is your Backup Strategy? When designing your enterprise backup strategy, we recommend following the 3-2-1 rule. This backup policy best practice calls for you to save your data in several different ways, so you always have a copy of your information. Here’s how: - Make 3 copies of your [...]
Is your online data and communication really that safe?
In October 2020 we shared some analysis reporting on "State of Ransomware – Excellent Analysis by Lumu Infographic". Since then we have followed various reports and restatements. It seems people are over-trusting their smartphone and IoT Apps. Somehow there is a belief that all is well with sharing data, images, [...]
X-Ways Forensics, X-Ways Investigator, WinHex 20.3 released
X-Ways Forensics has updated their tools. Some of the changes are: Text Extraction and OCR capabilities OCR can be applied as part of logical searches or indexing to suitable files such as document scans, TIFF, PDF, and JPG files Multiple Languages can be recognized File System Support Compressed data chunks [...]
Do you want to stalk your Customers?
Wrench.AI is a platform that provides personalization through data insights, with a goal of enabling marketing professionals and salespeople to save time and energy. The process is to parse data that is publicly available and try to match preferences, likes, and interests. Hence, marketing teams can focus more accurately on [...]
UPDATED 10-AUG-2021 / Urgent Update: MS-Windows Print Spooler Vulnerability
Point and Print Default Behavior Change - from the MSRC Team 10-AUG-2021: "Our investigation into several vulnerabilities collectively referred to as “PrintNightmare” has determined that the default behavior of Point and Print does not provide customers with the level of security required to protect against potential attacks. Today, we are [...]
Visual NAND Reconstructor 5.0 is now AI-Powered
The new VNR 5.0 software comes with a new cutting edge AI-powered solution for automatic XOR key synthesis and data descrambling in flash devices! Read the chip, find ECC and page structure, then launch XOR key synthesis. The XOR key doesn’t have to be supported in our database, the whole [...]
Why is facial recognition software developed for humans being used on pigs?
Where has your face been? How many cameras have taken your photo today? Do you have to smile for your smartphone or device to get access to said device? I think probably yes. Facial recognition algorithms are being employed in many applications, for the good. We really like the feature [...]
How are banks deploying biometrics and identity document scanning functions, and are they secure?
Consumers’ desire for digital banking is currently going unmet by most financial institutions (FIs), however, with only 45 percent of those in the U.S. and the U.K. offering some form of digital account opening. 49 percent of Americans say they would be happy never to set foot in a bank [...]