Different Android Flavors and Forensic Processing Written by Amber Schroader Android, developed by Google, is one of the most popular mobile operating systems worldwide, powering millions of devices. What you might not realize is that there are different tiers of...
Small Businesses: Don’t Make These 7 Common Cybersecurity Mistakes Written by Guest Blog Post: Lance Cody-Valdez Hackers are going after SMBs with a vengeance – 43 percent of all cyberattacks are directed toward these smaller companies, according to a Hacked report. ...
Why is Triage a good step in Digital Forensics? Written by Amber Schroader Many people discount the value of triage. Investigators try to obtain all the data at once, which can be costly and unproductive. With the data gap gone between mobile and computer-related...
Fall is full of new data in iOS 16 messages Written by Amber Schroader With each fall we see changes in the smartphone world with new firmware updates that bring extra spice to the pumpkin spice season. This year was not an exception with iOS 16 showing lots of new...
Investigating Current and Future Vulnerabilities of Electric Vehicle Charging Networks Written by Blogger Blog by: Cameron Cisneros, Zachary Wilson, Karla Soler and Ian Yates Research by: Felix Murray, Cameron Cisneros, Zachary Wilson, Karla Soler, Ian Yates, Unny...
23 Years of Innovations from Small Business Written by Starting 24 years of being a small business in the digital forensic investigations space is a rare activity. With many transitions happening with the different technology providers being sold, going public, or...
Recent Comments