White Paper: Demystifying Android Marshmallow Forensic Analysis

Why Download: Android 6.0’s encryption, passwords, and adoptable storage—and the skills and tools you need to collect evidence from devices that use them. With Android 6.0 or as it’s better known, Android Marshmallow on the...

Read more >

8 Tips for Presenting Digital Evidence in Court

As our world becomes more “connected”, digital evidence is playing a progressively more important role in criminal investigations, from fraud to intellectual property theft to child exploitation. But digital evidence is easily manipulated. If an...

Read more >

Find Important Business Apps & OS Artifacts for Your Digital Investigations

HERE’S OUR GUIDE TO FINDING IMPORTANT BUSINESS APPLICATIONS & OS ARTIFACTS FOR YOUR DIGITAL FORENSICS INVESTIGATIONS! Sometimes when conducting digital forensics examinations, investigators can lose sight of the fact that they’re investigating the actions of...

Read more >

Whitepaper: How important are Facebook Artifacts?

Facebook can be an indispensable online resource when recovering forensic artifacts to use as digital evidence. It can provide a glimpse into an individual’s life, offer geographical information to indicate where a person was on...

Read more >

How to Uncover the Covered Tracks

Uncover covered tracks

There are a variety of techniques used by suspects to erase and/or hide the things they do online. In this whitepaper, we will explore 3 different methods a person might use to conceal their online...

Read more >

Skype Forensics: Analyzing Call & Chat Data From Computers & Mobile

As a leading platform for voice and chat communications, Skype is often used as a platform for harassment or bullying incidents due to the perception that an individual’s actions are anonymous while on the Internet....

Read more >