Blog

Cool Stuff Happening

We have the best job in the world! And occasionally we get to share some of the sordid details, as well as provide some other useful tidbits our clients will find useful.

Recover Deleted Text Messages

Recover Deleted Text Messages

Text messages can hold crucial evidence that can make or break a case, and the deletion of these messages can pose a significant challenge. But fear not, fellow professionals! This blog aims to educate on recovering deleted text messages, shedding light on the methods...

iCloud Forensics- Closing the Loop on iPhone Exams

iCloud Forensics- Closing the Loop on iPhone Exams

iCloud Forensics: Ignore at Your Own Risk As the use of cloud-based storage and services continues to grow, forensic analysis of cloud data has become critical, including for iCloud, Apple's cloud storage service. With over a billion active Apple devices, iCloud’s...

New Online Evidence in the Paltrow Case

New Online Evidence in the Paltrow Case

In the Gwyneth Paltrow court case, the management and authentication of social media evidence was shown to be, um, challenging? From a computer forensics perspective, what a screw up. In fact, technical skills were not required to let the cat out of the bag here. The...

ChatGPT

ChatGPT

ChatGPT: It's not just for Geeks! Cyrano de Bergerac, eat your heart out. There is a new way for us tounge-tied dodos to be pitchin' woo, and that is AI. Or Artificial Intelligence. I wanted to wax poetic in sweet talking my wife, so check out the results from a...

Everything but the Kitchen Sync

Everything but the Kitchen Sync

We had a client that wanted to retrieve older text messages, but they were no longer on his iPhone. So we attempted to pull down his back up directly from iCloud, and there were none- he had not engaged his iCloud backup option on his iPhone. Lucky for us, and them,...

Protecting Information Assets with Multi-factor Authentication

Protecting Information Assets with Multi-factor Authentication

The word is out: insurance companies pay ransoms to cyber criminals. There is no “we don’t negotiate with terrorists” line drawn in the sand. Cyber security is breached, cyber criminals take over mission critical data, and insurers pay out on their cyber insurance...