Blog

How computer forensics is used to tackle blackmail and harassment

In an age of seemingly limitless connectivity, people all over the world now have the ability to contact one another with relative ease, 24-hours-a-day. While smart phones, tablets and computers are great at facilitating everything from business deals to online dating, they also make the potential for harassment much easier – and therefore more widespread … Continue reading How computer forensics is used to tackle blackmail and harassment

How USB Forensics Can Uncover Illegal Activity

For the past decade, digital forensics has been a hugely prominent force in the fight against illegal activity. Cases can be supported or dismissed on account of evidence gleaned from mobile forensics, computer forensics, and cell site analysis. However, cases usually require a device such as a smartphone or a laptop to be in the … Continue reading How USB Forensics Can Uncover Illegal Activity

Challenges in Mobile Forensics: How Manufacturer Security Is Getting Tighter

In 2020, the main challenge for cell phone forensics teams has continued to be encryption. This year, the encryption bundled with Android devices as standard has started to cause issues for computer forensics firms. While encryption has been around since Android 6, all mid-range Android devices and Samsung smartphones prior to 2019 made use of … Continue reading Challenges in Mobile Forensics: How Manufacturer Security Is Getting Tighter

6 Types of Digital Forensics That Can Help Solve Your Case

Digital or cyber forensics are changing the way that crimes are solved. In crimes related to a computer or similar electronic device, digital forensics can also be used in a court of law. But it’s not only the police force who use digital forensics. If you hire a private investigator in Texas they can help … Continue reading 6 Types of Digital Forensics That Can Help Solve Your Case

How to protect yourself from false forensics

It is commonly understood that once something leaves the closed system of your phone or computer, it is out of your hands. Text messages are saved by providers, blog posts are screenshotted and saved, and calls are logged or recorded. When it comes to technology, nothing is ephemeral. That said, technology is highly adaptable by … Continue reading How to protect yourself from false forensics