Search Results for: forensics services Page LIFARS Cyber Security Forensics Services and Forensic Review Process February 13, 2019 Blog Post What Is eDiscovery and Why Is It Important To a Company? January 22, 2021 eDiscovery comes directly from the term “discovery” in legal proceedings, such as investigations, litigations, or Freedom of Information Act requests.... Blog Post Threat Hunting vs Digital Forensics – What Are They? Do You Need Both? May 24, 2021 Threat hunting and digital forensics are just two of the cogs in a robust and multifaceted security machine. However, there... Blog Post How Malicious Actors Hide Apps on Their Devices October 25, 2019 When investigating a mobile device, whether a Tablet or Phone examiners should be wary of the many methods that can... Blog Post LIFARS Alert Flashback and Update: North Korean Trojan KEYMARBLE August 18, 2021 This blog revisits the Department of Homeland Security (DHS) and the Federal Bureau of Investigation (FBI) 2018 press release regarding... Blog Post Facial Recognition Tracking COVID-19 May Expose Privacy March 24, 2020 In the ongoing coronavirus pandemic, face recognition technology has been adopted worldwide to track the spread of the virus. But... Blog Post 7 Cybersecurity Lessons We Learned From the COVID-19 Outbreak April 1, 2020 The outbreak of COVID-19 is changing the current situation of the economy, creating confusion for industries such as retail, tourism,... Blog Post DoorDash Hit With Data Breach October 3, 2019 DoorDash confirmed in blog post a major data breach involving 4.9 customers, delivery workers, and merchants. The breach was discovered... Blog Post FBI Warns of Teleconferencing and Online Classroom Hijacking During COVID-19 Pandemic April 11, 2020 To curb the spread of COVID-19, millions of people were forced to stay at home. Zoom has become one of... Blog Post VPN Security is Highlighted With Everyone Working From Home March 22, 2020 The Internet is indeed a wonderful invention, but as we all know, risks can be hidden everywhere on the Internet.... Blog Post Apple’s Interception and Scrutiny of iCloud Data On Child Abuse February 24, 2020 Apple has always been known for its secretive policies to protect its users, data and operating system. It has different... Blog Post 2021 – a Record-Breaking Year for Crypto Scams February 11, 2022 In a blog post in early January 2022, Chainalysis, a blockchain data firm, claimed that 2021 was a record-breaking year... Blog Post Groove Ransomware Gang Attracts Affiliates by Attempting New Tactic October 5, 2021 Recently, a new ransomware gang named Groove has sparked the resurgence of cybercrimes to deal a blow to cybersecurity experts.... Blog Post Acquisition of Digital Evidence for Forensic Investigation May 28, 2021 The way of collecting digital forensic evidence is very important. The evidence in this area is volatile and delicate. It... Blog Post Secure Applications Make Mobile Forensics More Difficult October 25, 2019 Encryption apps are making mobile forensics harder than before. As phone providers and developers shift towards greater user privacy and...
Blog Post What Is eDiscovery and Why Is It Important To a Company? January 22, 2021 eDiscovery comes directly from the term “discovery” in legal proceedings, such as investigations, litigations, or Freedom of Information Act requests....
Blog Post Threat Hunting vs Digital Forensics – What Are They? Do You Need Both? May 24, 2021 Threat hunting and digital forensics are just two of the cogs in a robust and multifaceted security machine. However, there...
Blog Post How Malicious Actors Hide Apps on Their Devices October 25, 2019 When investigating a mobile device, whether a Tablet or Phone examiners should be wary of the many methods that can...
Blog Post LIFARS Alert Flashback and Update: North Korean Trojan KEYMARBLE August 18, 2021 This blog revisits the Department of Homeland Security (DHS) and the Federal Bureau of Investigation (FBI) 2018 press release regarding...
Blog Post Facial Recognition Tracking COVID-19 May Expose Privacy March 24, 2020 In the ongoing coronavirus pandemic, face recognition technology has been adopted worldwide to track the spread of the virus. But...
Blog Post 7 Cybersecurity Lessons We Learned From the COVID-19 Outbreak April 1, 2020 The outbreak of COVID-19 is changing the current situation of the economy, creating confusion for industries such as retail, tourism,...
Blog Post DoorDash Hit With Data Breach October 3, 2019 DoorDash confirmed in blog post a major data breach involving 4.9 customers, delivery workers, and merchants. The breach was discovered...
Blog Post FBI Warns of Teleconferencing and Online Classroom Hijacking During COVID-19 Pandemic April 11, 2020 To curb the spread of COVID-19, millions of people were forced to stay at home. Zoom has become one of...
Blog Post VPN Security is Highlighted With Everyone Working From Home March 22, 2020 The Internet is indeed a wonderful invention, but as we all know, risks can be hidden everywhere on the Internet....
Blog Post Apple’s Interception and Scrutiny of iCloud Data On Child Abuse February 24, 2020 Apple has always been known for its secretive policies to protect its users, data and operating system. It has different...
Blog Post 2021 – a Record-Breaking Year for Crypto Scams February 11, 2022 In a blog post in early January 2022, Chainalysis, a blockchain data firm, claimed that 2021 was a record-breaking year...
Blog Post Groove Ransomware Gang Attracts Affiliates by Attempting New Tactic October 5, 2021 Recently, a new ransomware gang named Groove has sparked the resurgence of cybercrimes to deal a blow to cybersecurity experts....
Blog Post Acquisition of Digital Evidence for Forensic Investigation May 28, 2021 The way of collecting digital forensic evidence is very important. The evidence in this area is volatile and delicate. It...
Blog Post Secure Applications Make Mobile Forensics More Difficult October 25, 2019 Encryption apps are making mobile forensics harder than before. As phone providers and developers shift towards greater user privacy and...