AccessData

 

Blog

 
 
Viewing all Blog posts tagged with: Computer-forensics

The DOJ-Apple Showdown: Setting a Precedent for Mobile Security

By Kevin DeLong

A showdown between Apple Inc. and law enforcement agencies, which has been brewing for several months, came to a head this week when U.S. Magistrate Judge Sheri Pym signed off on a Department of Justice request to force Apple to unlock a passcode-protected iPhone belonging to Syed Farook, one of the two people who carried out last year’s mass shooting in San Bernardino, Calif.

Read Article

Tags: apple, computer-forensics, cybersecurity, doj, fbi, obama, privacy, response, san bernadino, terror attack,

 

HERO Program Transitions Wounded Vets into Forensic Examiners

By Viviana Meneses

It takes a special kind of person to be a member of the U.S. Armed Forces. These brave men and women receive extensive training in their respective areas of military service and then respond to the orders they’re given to deploy to locations all over the world. Some of those service members soon return home with physical injuries or illnesses that make it impossible for their military careers to continue.

Read Article

Tags: child-exploitation, computer-forensics, digital-investigations, forensics, ftk-products, project-hero, viviana-meneses,

 

How far we’ve come: From early manual cell examinations to JTAG/Chip Off raw data extractions

By AccessData Insight

May 26, 2015 Mobile device examiners can utilize specific hardware to help build, program, and in some instances, even repair the device at the manufacturing level to collect the data. By utilizing sophisticated methods for data collection, and known device hardware specifications, examiners can now bypass device gesture and password locks, and even collect data from damaged or encrypted devices by accessing the flash memory chip directly. What we once thought to be only part of a CSI episode or only possible for the forensic scientist is now a reality among the mobile forensic community.

Read Article

Tags: computer-forensics, mobile, mobile-devices, mobile-forensics,

 

The True Essence of AccessData

By Viviana Meneses

December 1, 2014 Since AccessData introduced its first forensic tool almost 20 years ago, there has been one clear objective, helping dedicated investigators working to keep dangerous people off the streets. In providing those initial forensic tools, we made a commitment to work together with you to achieve this goal. Our job as a company was to support you in this endeavor. This objective was true back then and remains true today.

Read Article

Tags: accessdata, computer-forensics, viviana-meneses,

 

A tool-box approach to mobile device investigations.

By AccessData Insight

When it comes to mobile device investigations,a tool-box approach is best. This article discusses why.

Read Article

Tags: computer-forensics, forensics, mpe+,

 

Exciting Times at AccessData

By Tim Leehealey

This move makes good business sense and the timing is right. Our AccessData business is as solid as ever, while our incident response business is seeing myriad market opportunities. It’s not a question of whether the sum of our business parts is greater as a whole; the reality is separating AccessData into two companies translates into improved agility and customer focus to achieve business excellence.

Read Article

Tags: computer-forensics, e-discovery, resolution1, tim-leehealey,

 

The End of the Forensics/e-Discovery Divide

By Tim Leehealey

I can’t tell you how many times I’ve heard professionals in the e-Discovery and/or forensics field talk about the extreme differences between e-Discovery and forensics. If they’re forensics experts, they talk about the bag of complex tools they have and the obscure methods they use to unearth the hidden truth on a suspect’s computer and mobile devices. If they’re e-Discovery experts, they talk about leaving the collection up to the forensics experts so they can focus on contemporary non-linear review techniques. These experts are out of touch, and often they have a vested interest in maintaining the status quo. The simple fact is the two markets are converging so rapidly that I would be amazed if the divide wasn't completely gone within the next two years.

Read Article

Tags: accessdata, computer-forensics, e-discovery, federal, forensics, ftk-products, interoperate, market-leading, mobile-devices, realtime-collaboration,

 

BYOD: Keep Your Eye on the Enterprise

By AccessData Insight

The prevailing movement, labeled Consumerization of IT or Bring Your Own Device (BYOD), will continue to shift the way employees interact with enterprise applications and information, which raises considerable security challenges to any organization. These devices may include an array of tablets, including Apple® and Android™ smartphones, “Wintel” laptops, and devices we have yet to see. For some organizations, such as universities, the array of user devices may be unlimited, and therefore their grasp on securing data may be tenuous for quite some time. Other organizations will be in a better position to leverage policy to control the acceptable devices allowed and to ensure they have the ability to investigate these devices as needed.

Read Article

Tags: byod, cell-phones, computer-forensics, digital-investivations, incident-response, information-security, mobile-devices, mobile-forensics,