<?xml version='1.0' encoding='UTF-8'?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><feed xmlns='http://www.w3.org/2005/Atom' xmlns:openSearch='http://a9.com/-/spec/opensearchrss/1.0/' xmlns:blogger='http://schemas.google.com/blogger/2008' xmlns:georss='http://www.georss.org/georss' xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr='http://purl.org/syndication/thread/1.0'><id>tag:blogger.com,1999:blog-8093875796213061342</id><updated>2017-02-20T04:31:51.232+02:00</updated><category term="DLA Cape Town"/><category term="DLA"/><category term="DLA Digital Forensics"/><category term="digital forensics"/><category term="DLA Cellular Forensics"/><category term="cellular forensics"/><category term="digital evidence"/><category term="computer forensics"/><category term="mobile forensics"/><category term="cellular forensics Cape Town"/><category term="DLA computer forensics"/><category term="data recovery"/><category term="DLA data recovery"/><category term="digital forensics cape town"/><category term="DLA mobile forensics"/><category term="digital forensic investigators"/><category term="computer evidence"/><category term="mobile forensics Cape Town"/><category term="digital crimes"/><category term="DLA investigators"/><category term="Digital forensic experts"/><category term="Ikena"/><category term="Ikena Africa"/><category term="Ikena video enhancement"/><category term="cyber crime"/><category term="video enhancement"/><category term="DLA SMS recovery"/><category term="Forensic Data Recovery"/><category term="Ikena forensic software"/><category term="cellular forensics investigator"/><category term="computer forensics investigator"/><category term="data security"/><category term="digital forensics in criminal investigations"/><category term="digital investigators"/><category term="forensic video"/><category term="Apple vs. FBI"/><category term="DLA Forensic data recovery"/><category term="DLA Forensics"/><category term="DLA cyber crime"/><category term="DLA video enhancement"/><category term="SMS recovery"/><category term="WhatsApp"/><category term="WhatsApp chat history"/><category term="cyber attacks"/><category term="cyber criminal"/><category term="cyber criminals"/><category term="digital Forensics Investigation"/><category term="digital devices"/><category term="digital forensic crime"/><category term="digital forensic services"/><category term="digital forensic video"/><category term="how to protect your private data"/><category term="recover WhatsApp history"/><category term="social media evidence"/><category term="video enhancement Africa"/><category term="video evidence"/><category term="Apple"/><category term="Apple vs. FBI congressional hearing"/><category term="BTK killer"/><category term="CCTV Footage Enhancement"/><category term="Cellebrite iPhone investigation"/><category term="Christmas cyber-fraud"/><category term="Computer Forensics Basics"/><category term="Cyberstalking"/><category term="DDoS attack"/><category term="DLA digital forensic professionals"/><category term="DLA history recovery"/><category term="Different phases of a Computer Forensics Investigation"/><category term="Digital Image Verification"/><category term="FBI congressional hearing"/><category term="FBI iphone"/><category term="FBI iphone 5C"/><category term="Forensic Video Enhancement"/><category term="Forensic Video Enhancement Techniques"/><category term="How digital investigators solve crime with social media"/><category term="How to Keep your Smartphone Secure"/><category term="How to keep your data safe"/><category term="How to protect your PC data"/><category term="Ikena Forensic"/><category term="Mobile Attack"/><category term="Mobile Phone Analysis"/><category term="Recovery of WhatsApp History"/><category term="SMS harassment"/><category term="SMS message harassment"/><category term="SMS recovery tools"/><category term="San Bernardino shooter"/><category term="San Bernardino shooter iPhone"/><category term="Uncover the truth about data with cellular forensics"/><category term="What is Ikena Forensic"/><category term="What is a forensic audit"/><category term="What to do if a computer contains evidence"/><category term="WhatsApp history recovery"/><category term="antivirus program"/><category term="cellular forensic case"/><category term="cellular forensics for internet infidelity and divorce"/><category term="cellular security"/><category term="challenges of digital forensics"/><category term="common cyber attacks"/><category term="computer DDoS attack"/><category term="computer attack"/><category term="computer crimes"/><category term="computer forensic emergencies"/><category term="computer forensic interview"/><category term="computer forensic tips"/><category term="computer forensics evidence"/><category term="computer forensics investigation"/><category term="computer investigators"/><category term="crime solved by digital forensics"/><category term="crimes solved with digital forensics"/><category term="criminal investigations"/><category term="cyber fraud"/><category term="cyber-fraud"/><category term="data safety"/><category term="digital crime"/><category term="digital device"/><category term="digital divorce evidence"/><category term="digital experts"/><category term="digital forensic analysis"/><category term="digital forensic evidence"/><category term="digital forensic software"/><category term="digital forensic specialist"/><category term="digital stalking"/><category term="digital suspect profiling"/><category term="divorce evidence"/><category term="forensic audit"/><category term="forensic auditors"/><category term="forensic software"/><category term="forensic tips"/><category term="forensics investigator"/><category term="guide on saving evidence in Computer Forensic Emergencies"/><category term="hackers"/><category term="history of digital forensics"/><category term="holiday season cyber crime"/><category term="how digital forensics can help solve personal injury cases"/><category term="how do I save my WhatsApp chat history"/><category term="how does computer forensics work"/><category term="how does data recovery work"/><category term="how does forensics data recovery work"/><category term="how is digital evidence done"/><category term="how police use digital forensics to solve crimes"/><category term="how to avoid cyber-fraud"/><category term="how to become a digital forensics expert"/><category term="how to protect data on your phone"/><category term="iPhone investigation"/><category term="internet predators"/><category term="interview preparation"/><category term="job interview pointers"/><category term="job interview steps"/><category term="mobile device security"/><category term="mobile phone forensics"/><category term="mobile stalking"/><category term="password recovery"/><category term="password recovery services"/><category term="professional forensic investigators"/><category term="recover computer evidence"/><category term="security camera evidence"/><category term="smartphone safety"/><category term="smartphone security"/><category term="social networking for evidence"/><category term="stalking"/><category term="text message harassment"/><category term="video clarification"/><category term="video evidence in court"/><category term="ways to protect your PC data"/><category term="what is a mobile attack"/><category term="what is cellular forensics"/><category term="what is computer forensics"/><category term="what is data recovery"/><category term="what is digital evidence"/><category term="what is forensic data recovery"/><category term="whatsapp deleted messages"/><category term="whatsapp messages"/><category term="why you need a digital forensic examiner"/><title type='text'>The World of Digital Forensics</title><subtitle type='html'></subtitle><link rel='http://schemas.google.com/g/2005#feed' type='application/atom+xml' href='http://dla-digitalforensics.blogspot.com/feeds/posts/default'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8093875796213061342/posts/default'/><link rel='alternate' type='text/html' href='http://dla-digitalforensics.blogspot.com/'/><link rel='hub' href='http://pubsubhubbub.appspot.com/'/><link rel='next' type='application/atom+xml' href='http://www.blogger.com/feeds/8093875796213061342/posts/default?start-index=26&amp;max-results=25'/><author><name>Christine Romans</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//lh6.googleusercontent.com/-Nf4Jeogi-rg/AAAAAAAAAAI/AAAAAAAAFaQ/B5KkrDcY2m8/s512-c/photo.jpg'/></author><generator version='7.00' uri='http://www.blogger.com'>Blogger</generator><openSearch:totalResults>61</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><entry><id>tag:blogger.com,1999:blog-8093875796213061342.post-8115874293893405495</id><published>2017-02-08T11:13:00.001+02:00</published><updated>2017-02-08T11:13:54.644+02:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="antivirus program"/><category scheme="http://www.blogger.com/atom/ns#" term="computer attack"/><category scheme="http://www.blogger.com/atom/ns#" term="computer DDoS attack"/><category scheme="http://www.blogger.com/atom/ns#" term="DDoS attack"/><category scheme="http://www.blogger.com/atom/ns#" term="Digital forensic experts"/><category scheme="http://www.blogger.com/atom/ns#" term="digital forensics"/><category scheme="http://www.blogger.com/atom/ns#" term="DLA"/><category scheme="http://www.blogger.com/atom/ns#" term="DLA Digital Forensics"/><category scheme="http://www.blogger.com/atom/ns#" term="hackers"/><title type='text'>Could my Computer be affected by a DDoS Attack?</title><content type='html'>&lt;div class=&quot;MsoNormal&quot;&gt;Don’t think that you won’t be affected by a DDoS attack, because any computer is vulnerable to attack no matter how hard you try to protect it.&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;text-align: center;&quot;&gt;&lt;img alt=&quot;Related image&quot; height=&quot;426&quot; src=&quot;http://s3.amazonaws.com/digitaltrends-uploads-prod/2014/12/ddosattack.jpg&quot; width=&quot;640&quot; /&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;The malware could be installed on your PC without you even knowing, by clicking on an infected link or visiting a malicious website. Once your computer is contaminated your precious data is either lost, stolen or destroyed.&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;It is so important for you to make sure that your antivirus software is up-to-date, as well as to ensure that your PC has the latest security patches installed and a reliable firewall in pace. If you do not have any kind of protection you will become a target for hackers.&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;The digital forensic experts at &lt;a href=&quot;http://cellularforensics.co.za/&quot;&gt;DLA&lt;/a&gt; encourage everyone to install an antivirus program that is trustworthy before it is too late, however if your data is lost do not hesitate to contact them!&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;&lt;div class=&quot;MsoNormal&quot;&gt;Connected devices such as smart phones and other smart devices can also become victims of a DDoS attack. To protect these devices you need to always make sure you have downloaded the most recent security updates.&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://dla-digitalforensics.blogspot.com/feeds/8115874293893405495/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://dla-digitalforensics.blogspot.com/2017/02/could-my-computer-be-affected-by-ddos.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8093875796213061342/posts/default/8115874293893405495'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8093875796213061342/posts/default/8115874293893405495'/><link rel='alternate' type='text/html' href='http://dla-digitalforensics.blogspot.com/2017/02/could-my-computer-be-affected-by-ddos.html' title='Could my Computer be affected by a DDoS Attack?'/><author><name>Christine Romans</name><uri>https://plus.google.com/105596798670349217388</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//lh6.googleusercontent.com/-Nf4Jeogi-rg/AAAAAAAAAAI/AAAAAAAAFaQ/B5KkrDcY2m8/s512-c/photo.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8093875796213061342.post-3051395206231332551</id><published>2017-01-18T10:05:00.001+02:00</published><updated>2017-01-18T10:05:09.278+02:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="digital forensics"/><category scheme="http://www.blogger.com/atom/ns#" term="DLA"/><category scheme="http://www.blogger.com/atom/ns#" term="DLA Digital Forensics"/><category scheme="http://www.blogger.com/atom/ns#" term="DLA investigators"/><category scheme="http://www.blogger.com/atom/ns#" term="DLA SMS recovery"/><category scheme="http://www.blogger.com/atom/ns#" term="SMS harassment"/><category scheme="http://www.blogger.com/atom/ns#" term="SMS message harassment"/><category scheme="http://www.blogger.com/atom/ns#" term="SMS recovery"/><category scheme="http://www.blogger.com/atom/ns#" term="SMS recovery tools"/><category scheme="http://www.blogger.com/atom/ns#" term="text message harassment"/><title type='text'>What is SMS / Text Message Harassment?</title><content type='html'>&lt;div class=&quot;MsoNormal&quot;&gt;Harassment via SMS messages can mean a number of things, such as flooding victims with massive amounts of messages, sending abusive messages and even sexually inappropriate messages in the workplace.&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;text-align: center;&quot;&gt;&lt;img alt=&quot;Related image&quot; height=&quot;479&quot; src=&quot;http://www.plummerslade.com/wp-content/uploads/2015/12/TextMessage.jpg&quot; width=&quot;640&quot; /&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;There are steps you can take if you are dealing with this harassment; it usually starts with reporting it to the police. Later when evidence needs to be found, you will have to contact digital forensic experts to recover the harasser’s SMS messages for evidence. Consider contacting &lt;a href=&quot;http://cellularforensics.co.za/&quot;&gt;DLA Digital Forensics&lt;/a&gt; – with the latest &lt;a href=&quot;http://cellularforensics.co.za/9-services/19-sms-recovery&quot;&gt;SMS recovery&lt;/a&gt; tools and software, DLA can assist investigators and attorneys acquire evidence.&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;One way someone can harass a victim with text messages is to send hundreds of messages in one day, or even in a few hours. The messages harassers send can differ though, some are abusive after a dating failure others are violent messages sent from bullies. Some other tactics used include sending SMS messages in the middle of the night, or at times when the victims are busy and cannot be distracted.&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;text-align: center;&quot;&gt;&lt;img alt=&quot;Image result for shocked looking at hpone&quot; height=&quot;426&quot; src=&quot;http://news.psu.edu/sites/default/files/styles/threshold-992/public/risk%20taking%20teens%20iStock%20AntonioGuillem.jpg?itok=Lm3XXFvo&quot; width=&quot;640&quot; /&gt;&lt;/div&gt;&lt;br /&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;o:p&gt;If you feel you are a victim of SMS / text message harassment, make sure to block the messages, report it immediately and seek help!&lt;/o:p&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://dla-digitalforensics.blogspot.com/feeds/3051395206231332551/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://dla-digitalforensics.blogspot.com/2017/01/what-is-sms-text-message-harassment.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8093875796213061342/posts/default/3051395206231332551'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8093875796213061342/posts/default/3051395206231332551'/><link rel='alternate' type='text/html' href='http://dla-digitalforensics.blogspot.com/2017/01/what-is-sms-text-message-harassment.html' title='What is SMS / Text Message Harassment?'/><author><name>Christine Romans</name><uri>https://plus.google.com/105596798670349217388</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//lh6.googleusercontent.com/-Nf4Jeogi-rg/AAAAAAAAAAI/AAAAAAAAFaQ/B5KkrDcY2m8/s512-c/photo.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8093875796213061342.post-2971208136379659939</id><published>2016-12-21T12:02:00.001+02:00</published><updated>2016-12-21T12:02:58.614+02:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Christmas cyber-fraud"/><category scheme="http://www.blogger.com/atom/ns#" term="cyber crime"/><category scheme="http://www.blogger.com/atom/ns#" term="cyber fraud"/><category scheme="http://www.blogger.com/atom/ns#" term="cyber-fraud"/><category scheme="http://www.blogger.com/atom/ns#" term="DLA"/><category scheme="http://www.blogger.com/atom/ns#" term="DLA Forensics"/><category scheme="http://www.blogger.com/atom/ns#" term="holiday season cyber crime"/><category scheme="http://www.blogger.com/atom/ns#" term="how to avoid cyber-fraud"/><title type='text'>Avoid Cyber-Fraud this Holiday Season</title><content type='html'>&lt;div class=&quot;MsoNormal&quot;&gt;Getting your Christmas shopping done online is becoming the norm these days. Not only is it easy and convenient, but you also won’t have to deal with the horrible crowds, traffic and crazy long lines!&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;However, it also excites criminals who are lurking online, waiting to scam people.&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;text-align: center;&quot;&gt;&lt;img alt=&quot;Image result for cyber fraud&quot; height=&quot;424&quot; src=&quot;http://www.ieyenews.com/wordpress/wp-content/uploads/2016/03/iStock_000030196186_Large-1900x1260-1.jpg&quot; width=&quot;640&quot; /&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;a href=&quot;http://cellularforensics.co.za/&quot;&gt;DLA&lt;/a&gt; has put together five tips to keep you safe this holiday season:&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;b&gt;&amp;gt;&amp;gt; know the scams&lt;o:p&gt;&lt;/o:p&gt;&lt;/b&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;Never open links or emails from strange email addresses. It’s always best to question emails and double check if they are actually legit, such as your bank. &lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;Stay safe online by reading up on the latest scams and avoid becoming a victim of cyber-fraud.&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;b&gt;&amp;gt;&amp;gt; install a firewall&lt;o:p&gt;&lt;/o:p&gt;&lt;/b&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;A firewall isn’t always 100 percent safe, but it is a much-needed layered security.&amp;nbsp; The software filters and keeps you safe from malware and downloads. &lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;Windows offers a built-in firewall, but if you are looking for something else there are some great free firewall software suites online.&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;text-align: center;&quot;&gt;&lt;img alt=&quot;Related image&quot; height=&quot;285&quot; src=&quot;https://davescomputertips.com/wp-content/uploads/2014/09/firewall-image-1.jpg&quot; width=&quot;400&quot; /&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;b&gt;&amp;gt;&amp;gt; choose a strong password&lt;o:p&gt;&lt;/o:p&gt;&lt;/b&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;If you use the most commonly known passwords out there – password, qwerty, 123456789 – then don’t be surprised when hackers take control. &lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;It is best to try add numbers, capital letters, special characters and always use different passwords for different accounts.&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;b&gt;&amp;gt;&amp;gt; check the URL&lt;o:p&gt;&lt;/o:p&gt;&lt;/b&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;When shopping online, always check the URL of the website you’re on. Safe online sites will have a little green lock in the address bar which shows you that your personal data will be protected.&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;Always keep an eye out for the green padlock to ensure your safety online.&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;text-align: center;&quot;&gt;&lt;img alt=&quot;Image result for green lock URL&quot; height=&quot;400&quot; src=&quot;https://lostcoastoutpost.com/media/cache/b5/65/b56543c2cbdf54be5acca1d37d0664e0.jpg&quot; width=&quot;400&quot; /&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;b&gt;&amp;gt;&amp;gt; back up your data on a regular basis&lt;o:p&gt;&lt;/o:p&gt;&lt;/b&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;Ransomware can be vicious and aggressive, so regular data backups should always be a part of your cyber-security strategy. &lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;It is easier to restore your device to a previous backup, than pay an exorbitant ransom amount to unlock your data, which most of the time doesn’t even work!&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;&lt;div class=&quot;MsoNormal&quot;&gt;Cyber-fraud is a global problem with attacks happening daily and Christmas is no exception. Identity theft, banking fraud and malware are common place in today’s digital society. Criminals seek out opportunities every day of the year to defraud you, so be vigilant this festive season and keep an eye out for any fraudulent behaviour online!&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://dla-digitalforensics.blogspot.com/feeds/2971208136379659939/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://dla-digitalforensics.blogspot.com/2016/12/avoid-cyber-fraud-this-holiday-season.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8093875796213061342/posts/default/2971208136379659939'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8093875796213061342/posts/default/2971208136379659939'/><link rel='alternate' type='text/html' href='http://dla-digitalforensics.blogspot.com/2016/12/avoid-cyber-fraud-this-holiday-season.html' title='Avoid Cyber-Fraud this Holiday Season'/><author><name>Christine Romans</name><uri>https://plus.google.com/105596798670349217388</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//lh6.googleusercontent.com/-Nf4Jeogi-rg/AAAAAAAAAAI/AAAAAAAAFaQ/B5KkrDcY2m8/s512-c/photo.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8093875796213061342.post-5871580640626670166</id><published>2016-11-30T10:52:00.000+02:00</published><updated>2016-11-30T10:52:45.150+02:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="cellular security"/><category scheme="http://www.blogger.com/atom/ns#" term="data recovery"/><category scheme="http://www.blogger.com/atom/ns#" term="DLA"/><category scheme="http://www.blogger.com/atom/ns#" term="DLA Cellular Forensics"/><category scheme="http://www.blogger.com/atom/ns#" term="DLA data recovery"/><category scheme="http://www.blogger.com/atom/ns#" term="How to Keep your Smartphone Secure"/><category scheme="http://www.blogger.com/atom/ns#" term="mobile device security"/><category scheme="http://www.blogger.com/atom/ns#" term="smartphone safety"/><category scheme="http://www.blogger.com/atom/ns#" term="smartphone security"/><title type='text'>How to Keep your Smartphone Secure</title><content type='html'>&lt;div class=&quot;MsoNormal&quot;&gt;Your smartphone is no different to your property or house when it comes to safety – you have to use common sense!&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;text-align: center;&quot;&gt;&lt;img alt=&quot;Image result&quot; src=&quot;http://netdoctor.cdnds.net/16/10/980x490/landscape-1457439936-man-holding-smartphone.jpg&quot; height=&quot;320&quot; width=&quot;640&quot; /&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;Here are eight easy tips on how to keep your smartphone safe and secure:&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;MsoListParagraph&quot; style=&quot;mso-list: l0 level1 lfo1; text-indent: -18.0pt;&quot;&gt;&lt;!--[if !supportLists]--&gt;&lt;b&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; 1.&lt;span style=&quot;font-size: 7pt; font-stretch: normal; font-variant-numeric: normal; font-weight: normal; line-height: normal;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;/b&gt;&lt;!--[endif]--&gt;&lt;b&gt;Use a password&lt;o:p&gt;&lt;/o:p&gt;&lt;/b&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;Always set up a password, pin or pattern to be able to access your phone. For Android: go to &lt;b&gt;Location &amp;amp; Security&lt;/b&gt;. For iOS: go to &lt;b&gt;Settings&lt;/b&gt;-&amp;gt; &lt;b&gt;Touch ID &amp;amp; Passcode&lt;/b&gt;. &lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;MsoListParagraph&quot; style=&quot;mso-list: l0 level1 lfo1; text-indent: -18.0pt;&quot;&gt;&lt;!--[if !supportLists]--&gt;&lt;b&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; 2.&lt;span style=&quot;font-size: 7pt; font-stretch: normal; font-variant-numeric: normal; font-weight: normal; line-height: normal;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;/b&gt;&lt;!--[endif]--&gt;&lt;b&gt;Only download from trusted stores&lt;o:p&gt;&lt;/o:p&gt;&lt;/b&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;Use places like Google Play and the App Store to download your games and apps. Also make sure to always read the ratings and reviews if they’re available.&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;MsoListParagraph&quot; style=&quot;mso-list: l0 level1 lfo1; text-indent: -18.0pt;&quot;&gt;&lt;!--[if !supportLists]--&gt;&lt;b&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; 3.&lt;span style=&quot;font-size: 7pt; font-stretch: normal; font-variant-numeric: normal; font-weight: normal; line-height: normal;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;/b&gt;&lt;!--[endif]--&gt;&lt;b&gt;Back up your data&lt;o:p&gt;&lt;/o:p&gt;&lt;/b&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;Protect your information in case an attack happens by backing up your data. If your data ever gets lost, we can recover it. Contact the experts at &lt;a href=&quot;http://cellularforensics.co.za/&quot;&gt;DLA&lt;/a&gt; to get your data back!&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;MsoListParagraph&quot; style=&quot;mso-list: l0 level1 lfo1; text-indent: -18.0pt;&quot;&gt;&lt;!--[if !supportLists]--&gt;&lt;b&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; 4.&lt;span style=&quot;font-size: 7pt; font-stretch: normal; font-variant-numeric: normal; line-height: normal;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;!--[endif]--&gt;Update your OS and apps&lt;/b&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;Most updates are just for new features, but sometimes they are also to up the security.&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/div&gt;&lt;div class=&quot;MsoListParagraph&quot; style=&quot;mso-list: l0 level1 lfo1; text-indent: -18.0pt;&quot;&gt;&lt;!--[if !supportLists]--&gt;&lt;b&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; 5.&lt;span style=&quot;font-size: 7pt; font-stretch: normal; font-variant-numeric: normal; line-height: normal;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;!--[endif]--&gt;Log out!&lt;/b&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;If you do your banking or online shopping on your cellular device, always make sure to log out afterwards. Never keep your passwords and usernames on your phone and try to avoid using public Wi-Fi.&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;MsoListParagraph&quot; style=&quot;mso-list: l0 level1 lfo1; text-indent: -18.0pt;&quot;&gt;&lt;!--[if !supportLists]--&gt;&lt;b&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; 6.&lt;span style=&quot;font-size: 7pt; font-stretch: normal; font-variant-numeric: normal; line-height: normal;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;!--[endif]--&gt;Turn off Wi-Fi and Bluetooth&lt;/b&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;You may think it’s just a way to connect to free Wi-Fi, but hackers can also use it to access your device and data.&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/div&gt;&lt;div class=&quot;MsoListParagraph&quot; style=&quot;mso-list: l0 level1 lfo1; text-indent: -18.0pt;&quot;&gt;&lt;!--[if !supportLists]--&gt;&lt;b&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; 7.&lt;span style=&quot;font-size: 7pt; font-stretch: normal; font-variant-numeric: normal; line-height: normal;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;!--[endif]--&gt;Don’t give out personal info&lt;/b&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;That email you received that looks like it’s from your bank may be spam. If you get SMS’s or emails asking you to fill in your private info and login, always contact the business and confirm it is actually legit.&amp;nbsp;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://dla-digitalforensics.blogspot.com/feeds/5871580640626670166/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://dla-digitalforensics.blogspot.com/2016/11/how-to-keep-your-smartphone-secure.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8093875796213061342/posts/default/5871580640626670166'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8093875796213061342/posts/default/5871580640626670166'/><link rel='alternate' type='text/html' href='http://dla-digitalforensics.blogspot.com/2016/11/how-to-keep-your-smartphone-secure.html' title='How to Keep your Smartphone Secure'/><author><name>Christine Romans</name><uri>https://plus.google.com/105596798670349217388</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//lh6.googleusercontent.com/-Nf4Jeogi-rg/AAAAAAAAAAI/AAAAAAAAFaQ/B5KkrDcY2m8/s512-c/photo.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8093875796213061342.post-1915410475320077481</id><published>2016-11-23T11:43:00.001+02:00</published><updated>2016-11-23T11:43:29.540+02:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="cyber attacks"/><category scheme="http://www.blogger.com/atom/ns#" term="data recovery"/><category scheme="http://www.blogger.com/atom/ns#" term="data safety"/><category scheme="http://www.blogger.com/atom/ns#" term="data security"/><category scheme="http://www.blogger.com/atom/ns#" term="DLA"/><category scheme="http://www.blogger.com/atom/ns#" term="DLA Cape Town"/><category scheme="http://www.blogger.com/atom/ns#" term="DLA data recovery"/><category scheme="http://www.blogger.com/atom/ns#" term="Forensic Data Recovery"/><category scheme="http://www.blogger.com/atom/ns#" term="How to keep your data safe"/><title type='text'>6 Easy Steps to Keep your Data Safe</title><content type='html'>&lt;div class=&quot;MsoNormal&quot;&gt;These simple steps can keep your data safe, whether it is on your work computer, personal laptop or smartphone. Malfunctions, cyber attacks and viruses can happen to anyone – if you’ve lost your precious data, we can recover it! Contact the experts at &lt;a href=&quot;http://cellularforensics.co.za/&quot;&gt;DLA&lt;/a&gt; today!&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&amp;gt;&amp;gt; Use the right software to protect your data. Anti-malware is a must if you want to protect your computer!&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&amp;gt;&amp;gt; Prevent viruses from attacking your PC and destroying your data by installing virus and spyware protection.&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&amp;gt;&amp;gt; Stop viruses and malware from getting into your system by using a firewall to block dangerous programs.&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&amp;gt;&amp;gt; Be wary when you receive emails from unknown sources. Never open an email attachment or clink on a link if you don’t know where the email came from.&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&amp;gt;&amp;gt; Stay away from dodgy websites that might contain viruses. &lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&amp;gt;&amp;gt; Always keep your operating system up to date by installing any recent updates or fixes.&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;text-align: center;&quot;&gt;&lt;img alt=&quot;Related image&quot; height=&quot;426&quot; src=&quot;https://www.euractiv.fr/wp-content/uploads/sites/3/2016/09/laptop-mobile.jpg&quot; width=&quot;640&quot; /&gt;&lt;/div&gt;&lt;br /&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://dla-digitalforensics.blogspot.com/feeds/1915410475320077481/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://dla-digitalforensics.blogspot.com/2016/11/6-easy-steps-to-keep-your-data-safe.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8093875796213061342/posts/default/1915410475320077481'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8093875796213061342/posts/default/1915410475320077481'/><link rel='alternate' type='text/html' href='http://dla-digitalforensics.blogspot.com/2016/11/6-easy-steps-to-keep-your-data-safe.html' title='6 Easy Steps to Keep your Data Safe'/><author><name>Christine Romans</name><uri>https://plus.google.com/105596798670349217388</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//lh6.googleusercontent.com/-Nf4Jeogi-rg/AAAAAAAAAAI/AAAAAAAAFaQ/B5KkrDcY2m8/s512-c/photo.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8093875796213061342.post-1089907931393390426</id><published>2016-10-26T11:22:00.001+02:00</published><updated>2016-10-26T11:22:25.189+02:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="cellular forensics"/><category scheme="http://www.blogger.com/atom/ns#" term="digital crime"/><category scheme="http://www.blogger.com/atom/ns#" term="digital crimes"/><category scheme="http://www.blogger.com/atom/ns#" term="digital device"/><category scheme="http://www.blogger.com/atom/ns#" term="digital devices"/><category scheme="http://www.blogger.com/atom/ns#" term="digital forensic crime"/><category scheme="http://www.blogger.com/atom/ns#" term="digital forensics cape town"/><category scheme="http://www.blogger.com/atom/ns#" term="DLA"/><category scheme="http://www.blogger.com/atom/ns#" term="DLA Digital Forensics"/><title type='text'>How a digital device becomes involved in a crime</title><content type='html'>&lt;div class=&quot;MsoNormal&quot;&gt;Crimes committed using a digital device essentially employ a hi-tech method to carry out what is usually a traditional crime. Thus, crimes such as blackmail which traditionally evoke images of newspaper cuttings collaged together to create the archetypal ransom note nowadays employ computers to produce the ransom note, be it a printed document or an email.&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;text-align: center;&quot;&gt;&lt;img alt=&quot;Image result&quot; height=&quot;288&quot; src=&quot;https://msenterprise.global.ssl.fastly.net/wordpress/2015/11/Keyboard-with-handcuffs.jpg&quot; width=&quot;640&quot; /&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;Examples of other traditional crimes where a digital device has been applied include instant messaging, which can used to commit harassment; email, which is applied to commit fraud though &#39;phishing&#39; scams; mobile phones to record assaults in what has come to be known as &#39;happy slapping&#39; and then there are the peer to peer file sharing programs which have been used extensively to download and distribute pictures portraying pedophilia.&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;The list, it seems, is endless and so is the workload on any hi-tech crime unit to deal with such cases.&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;Not all crimes committed using a digital device use it as a means to an end. Hacking a computer system without authority is a crime targeted at the computer system itself. So to is a denial of service (DOS) attack on a websites or the intentionally distribution of a virus.&lt;/div&gt;&lt;br /&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;o:p&gt;At &lt;a href=&quot;http://cellularforensics.co.za/&quot;&gt;DLA&lt;/a&gt;&lt;/o:p&gt;&lt;a href=&quot;http://cellularforensics.co.za/&quot;&gt; Digital Forensics&lt;/a&gt;, we combine the experience of two seasoned investigators with both criminal and civil backgrounds with the latest technologies to achieve the results that you require. From data recovery, recovery of chat history, digital suspect profiling and so much more - contact &lt;a href=&quot;http://cellularforensics.co.za/&quot;&gt;DLA&lt;/a&gt; today!&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://dla-digitalforensics.blogspot.com/feeds/1089907931393390426/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://dla-digitalforensics.blogspot.com/2016/10/how-digital-device-becomes-involved-in.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8093875796213061342/posts/default/1089907931393390426'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8093875796213061342/posts/default/1089907931393390426'/><link rel='alternate' type='text/html' href='http://dla-digitalforensics.blogspot.com/2016/10/how-digital-device-becomes-involved-in.html' title='How a digital device becomes involved in a crime'/><author><name>Christine Romans</name><uri>https://plus.google.com/105596798670349217388</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//lh6.googleusercontent.com/-Nf4Jeogi-rg/AAAAAAAAAAI/AAAAAAAAFaQ/B5KkrDcY2m8/s512-c/photo.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8093875796213061342.post-7498816080129195607</id><published>2016-10-12T10:07:00.001+02:00</published><updated>2016-10-12T10:07:17.520+02:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="cellular forensics"/><category scheme="http://www.blogger.com/atom/ns#" term="cellular forensics Cape Town"/><category scheme="http://www.blogger.com/atom/ns#" term="data recovery"/><category scheme="http://www.blogger.com/atom/ns#" term="DLA"/><category scheme="http://www.blogger.com/atom/ns#" term="DLA Cape Town"/><category scheme="http://www.blogger.com/atom/ns#" term="DLA Cellular Forensics"/><category scheme="http://www.blogger.com/atom/ns#" term="DLA data recovery"/><category scheme="http://www.blogger.com/atom/ns#" term="password recovery"/><category scheme="http://www.blogger.com/atom/ns#" term="password recovery services"/><title type='text'>The Importance of a Strong Password</title><content type='html'>&lt;div class=&quot;MsoNormal&quot;&gt;Too many people come to us in a frenzy complaining that either their data has been lost or stolen OR they simply cannot remember their password. When you don’t have a password you cant access or protect your files, on the other hand even if you do have a password you need to ensure it is 100% foolproof so you don’t end up being the victim!&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;text-align: center;&quot;&gt;&lt;img alt=&quot;Image result&quot; height=&quot;360&quot; src=&quot;https://cdn.arstechnica.net/wp-content/uploads/2013/03/password-cracking.jpg&quot; width=&quot;640&quot; /&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;a href=&quot;http://cellularforensics.co.za/&quot;&gt;DLA&lt;/a&gt; offers &lt;a href=&quot;http://cellularforensics.co.za/9-services/20-password-recovery&quot;&gt;password recovery services&lt;/a&gt; for businesses and personal computer users, using only the latest technologies to achieve the password recovery results you need. Our forensic recovery service includes recovering passwords from zipped files, word documents, excel files and of course logon profiles on computers. &lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;We are able to access what cannot be seen using the latest forensic technology. Using state of the art cellular forensics tools we are also able to bypass 98% of device passwords to read the device directly without needing to know the handsets logon or password.&amp;nbsp;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;We can also perform cellular forensics as well as &lt;a href=&quot;http://cellularforensics.co.za/9-services/18-data-recovery&quot;&gt;data recovery&lt;/a&gt;&amp;nbsp;from laptops, computers, cell phones and media devices such as tablets. &lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;Do not hesitate to contact &lt;a href=&quot;http://cellularforensics.co.za/&quot;&gt;DLA&lt;/a&gt; for professional and affordable services in Cape Town and the surrounding areas!&lt;/div&gt;&lt;br /&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://dla-digitalforensics.blogspot.com/feeds/7498816080129195607/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://dla-digitalforensics.blogspot.com/2016/10/the-importance-of-strong-password.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8093875796213061342/posts/default/7498816080129195607'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8093875796213061342/posts/default/7498816080129195607'/><link rel='alternate' type='text/html' href='http://dla-digitalforensics.blogspot.com/2016/10/the-importance-of-strong-password.html' title='The Importance of a Strong Password'/><author><name>Christine Romans</name><uri>https://plus.google.com/105596798670349217388</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//lh6.googleusercontent.com/-Nf4Jeogi-rg/AAAAAAAAAAI/AAAAAAAAFaQ/B5KkrDcY2m8/s512-c/photo.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8093875796213061342.post-9080495477179486483</id><published>2016-09-21T13:03:00.001+02:00</published><updated>2016-09-21T13:03:32.457+02:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="digital devices"/><category scheme="http://www.blogger.com/atom/ns#" term="digital evidence"/><category scheme="http://www.blogger.com/atom/ns#" term="digital forensic crime"/><category scheme="http://www.blogger.com/atom/ns#" term="digital forensics"/><category scheme="http://www.blogger.com/atom/ns#" term="DLA"/><category scheme="http://www.blogger.com/atom/ns#" term="DLA Cape Town"/><category scheme="http://www.blogger.com/atom/ns#" term="DLA Digital Forensics"/><category scheme="http://www.blogger.com/atom/ns#" term="DLA investigators"/><title type='text'>How Digital Devices are collected on a Crime Scene</title><content type='html'>&lt;div class=&quot;MsoNormal&quot;&gt;As anyone who has dropped a cell phone in a lake or had their computer damaged in a move or a thunderstorm knows, digitally stored information is very sensitive and easily lost. There are general best practices, developed by organizations to properly seize devices and computers.&amp;nbsp;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;text-align: center;&quot;&gt;&lt;img alt=&quot;Image result&quot; src=&quot;http://www.forensicsciencesimplified.org/digital/img/iS000017832014.jpg&quot; /&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;Once the scene has been secured and legal authority to seize the evidence has been confirmed, devices can be collected. Any passwords, codes or PINs should be gathered from the individuals involved, if possible, and associated chargers, cables, peripherals, and manuals should be collected.&amp;nbsp;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;Thumb drives, cell phones, hard drives and the like are examined using different tools and techniques, and this is most often done in a specialized laboratory.&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;First responders need to take special care with digital devices in addition to normal evidence collection procedures to prevent exposure to things like extreme temperatures, static electricity and moisture.&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;- Devices should be turned off immediately and batteries removed, if possible. Turning off the phone preserves cell tower location information and call logs, and prevents the phone from being used, which could change the data on the phone. In addition, if the device remains on, remote destruction commands could be used without the investigator’s knowledge. Some phones have an automatic timer to turn on the phone for updates, which could compromise data, so battery removal is optimal.&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;- If the device cannot be turned off, then it must be isolated from its cell tower by placing it in a Faraday bag or other blocking material, set to airplane mode, or the Wi-Fi, Bluetooth or other communications system must be disabled. Digital devices should be placed in antistatic packaging such as paper bags or envelopes and cardboard boxes. Plastic should be avoided as it can convey static electricity or allow a build-up of condensation or humidity.&lt;span style=&quot;font-family: Cambria, serif; font-size: 13.5pt; line-height: 115%;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;&lt;div class=&quot;MsoNormal&quot;&gt;- When sending digital devices to the laboratory, the investigator must indicate the type of information being sought, for instance phone numbers and call histories from a cell phone, emails, documents and messages from a computer, or images on a tablet.&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;text-align: center;&quot;&gt;&lt;img alt=&quot;Image result&quot; height=&quot;240&quot; src=&quot;https://www2.guidancesoftware.com/PublishingImages/Solutions/iStock_000021279734Small.jpg&quot; width=&quot;400&quot; /&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;text-align: center;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;text-align: left;&quot;&gt;Computers and cellular devices have had an increasing role in modern crime, let the digital forensic experts at &lt;a href=&quot;http://cellularforensics.co.za/&quot;&gt;DLA&lt;/a&gt; follow the electronic trail to find and protect the digital evidence that you need.&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://dla-digitalforensics.blogspot.com/feeds/9080495477179486483/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://dla-digitalforensics.blogspot.com/2016/09/how-digital-devices-are-collected-on.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8093875796213061342/posts/default/9080495477179486483'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8093875796213061342/posts/default/9080495477179486483'/><link rel='alternate' type='text/html' href='http://dla-digitalforensics.blogspot.com/2016/09/how-digital-devices-are-collected-on.html' title='How Digital Devices are collected on a Crime Scene'/><author><name>Christine Romans</name><uri>https://plus.google.com/105596798670349217388</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//lh6.googleusercontent.com/-Nf4Jeogi-rg/AAAAAAAAAAI/AAAAAAAAFaQ/B5KkrDcY2m8/s512-c/photo.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8093875796213061342.post-638686639234049707</id><published>2016-09-07T10:58:00.002+02:00</published><updated>2016-09-07T10:58:52.984+02:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="DLA"/><category scheme="http://www.blogger.com/atom/ns#" term="DLA video enhancement"/><category scheme="http://www.blogger.com/atom/ns#" term="forensic video"/><category scheme="http://www.blogger.com/atom/ns#" term="Ikena"/><category scheme="http://www.blogger.com/atom/ns#" term="Ikena Africa"/><category scheme="http://www.blogger.com/atom/ns#" term="Ikena Forensic"/><category scheme="http://www.blogger.com/atom/ns#" term="Ikena forensic software"/><category scheme="http://www.blogger.com/atom/ns#" term="Ikena video enhancement"/><category scheme="http://www.blogger.com/atom/ns#" term="video clarification"/><category scheme="http://www.blogger.com/atom/ns#" term="video enhancement"/><category scheme="http://www.blogger.com/atom/ns#" term="video evidence"/><category scheme="http://www.blogger.com/atom/ns#" term="What is Ikena Forensic"/><title type='text'>What is Ikena Forensic and what can it do for you?</title><content type='html'>&lt;div class=&quot;MsoNormal&quot;&gt;&lt;a href=&quot;http://www.singhalcomputers.in/wp-content/uploads/2016/04/store-security-camera.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img alt=&quot;Image result&quot; border=&quot;0&quot; height=&quot;256&quot; src=&quot;http://www.singhalcomputers.in/wp-content/uploads/2016/04/store-security-camera.jpg&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;Would you like to see a video more clearly? Perhaps you need to clear up a video to see a criminal’s license plate number, or maybe the face of a thief you captured?&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;Here at &lt;a href=&quot;http://cellularforensics.co.za/&quot;&gt;DLA&lt;/a&gt;, we are now an Africa Exclusive Agent for &lt;a href=&quot;https://www.motiondsp.com/ikena-forensic/&quot;&gt;Ikena Forensic&lt;/a&gt;, meaning that all those valuable details that you’ve been missing will now be revealed!&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;Unlike all the other video clarification software out there, Ikena Forensic applies multiple advanced algorithms to fix any issues that destroy the quality of the video.&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;Here are several of the patented algorithms that will help you get the most out of your video...&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;b&gt;&lt;i&gt;&lt;u&gt;Super Resolution –&lt;/u&gt;&lt;/i&gt;&lt;/b&gt; Multiple frames of video are combined to recover details and remove noise.&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;b&gt;&lt;u&gt;&lt;i&gt;Deinterlacing –&lt;/i&gt;&lt;/u&gt;&lt;/b&gt; 2x resolution is recovered with kernel regression deinterlacing.&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;b&gt;&lt;u&gt;&lt;i&gt;Light &amp;amp; Contract –&lt;/i&gt;&lt;/u&gt;&lt;/b&gt; Uncovers details that you may have missed in your video.&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;b&gt;&lt;u&gt;&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;/u&gt;&lt;/b&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;b&gt;&lt;u&gt;&lt;i&gt;Stabilization –&lt;/i&gt;&lt;/u&gt;&lt;/b&gt; Stabilizes shaky video from the most extreme cases with multiple frame stabilization.&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;The difference when we use the Ikena Forensic is clear – all the critical information that you were missing before is revealed!&lt;/div&gt;&lt;br /&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;o:p&gt;Take a look at the videos below...&lt;/o:p&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;o:p&gt;&lt;br /&gt;&lt;/o:p&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;iframe width=&quot;320&quot; height=&quot;266&quot; class=&quot;YOUTUBE-iframe-video&quot; data-thumbnail-src=&quot;https://i.ytimg.com/vi/DwryXthJMSU/0.jpg&quot; src=&quot;https://www.youtube.com/embed/DwryXthJMSU?feature=player_embedded&quot; frameborder=&quot;0&quot; allowfullscreen&gt;&lt;/iframe&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;iframe width=&quot;320&quot; height=&quot;266&quot; class=&quot;YOUTUBE-iframe-video&quot; data-thumbnail-src=&quot;https://i.ytimg.com/vi/__ws59m5sd4/0.jpg&quot; src=&quot;https://www.youtube.com/embed/__ws59m5sd4?feature=player_embedded&quot; frameborder=&quot;0&quot; allowfullscreen&gt;&lt;/iframe&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: justify;&quot;&gt;&lt;o:p style=&quot;text-align: start;&quot;&gt;Contact us here for more information..&lt;/o:p&gt;&lt;span style=&quot;text-align: start;&quot;&gt;.&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;mailto:info@cellularforensics.co.za&quot; style=&quot;text-align: start;&quot;&gt;info@cellularforensics.co.za&lt;/a&gt;&lt;span style=&quot;text-align: start;&quot;&gt;&amp;nbsp;or 082 886 8327 / 021 551 6222&lt;/span&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://dla-digitalforensics.blogspot.com/feeds/638686639234049707/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://dla-digitalforensics.blogspot.com/2016/09/what-is-ikena-forensic-and-what-can-it.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8093875796213061342/posts/default/638686639234049707'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8093875796213061342/posts/default/638686639234049707'/><link rel='alternate' type='text/html' href='http://dla-digitalforensics.blogspot.com/2016/09/what-is-ikena-forensic-and-what-can-it.html' title='What is Ikena Forensic and what can it do for you?'/><author><name>Christine Romans</name><uri>https://plus.google.com/105596798670349217388</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//lh6.googleusercontent.com/-Nf4Jeogi-rg/AAAAAAAAAAI/AAAAAAAAFaQ/B5KkrDcY2m8/s512-c/photo.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://img.youtube.com/vi/DwryXthJMSU/default.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8093875796213061342.post-6910123150245395642</id><published>2016-09-06T14:55:00.001+02:00</published><updated>2016-09-06T14:55:44.968+02:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="digital forensic video"/><category scheme="http://www.blogger.com/atom/ns#" term="Forensic Video Enhancement"/><category scheme="http://www.blogger.com/atom/ns#" term="Forensic Video Enhancement Techniques"/><category scheme="http://www.blogger.com/atom/ns#" term="Ikena"/><category scheme="http://www.blogger.com/atom/ns#" term="Ikena Africa"/><category scheme="http://www.blogger.com/atom/ns#" term="Ikena forensic software"/><category scheme="http://www.blogger.com/atom/ns#" term="Ikena video enhancement"/><category scheme="http://www.blogger.com/atom/ns#" term="video enhancement"/><category scheme="http://www.blogger.com/atom/ns#" term="video enhancement Africa"/><title type='text'>Forensic Video Enhancement Techniques</title><content type='html'>&lt;div class=&quot;MsoNormal&quot;&gt;The objective of Forensic Video Enhancement is to clarify or enhance the events as they occurred. This is done using non destructive techniques to preserve the video evidence integrity, and pixel quality.&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;text-align: center;&quot;&gt;&lt;img alt=&quot;Image result&quot; height=&quot;196&quot; src=&quot;https://encrypted-tbn0.gstatic.com/images?q=tbn:ANd9GcSgK4WqLx7lSW9FIE5iziJZRVXTzdkU5vjbmzNh---XXnYfzy0v&quot; width=&quot;400&quot; /&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;As &lt;a href=&quot;http://cellularforensics.co.za/&quot;&gt;DLA&lt;/a&gt;, the digital forensics experts are often asked to enhance CCTV Surveillance video recordings for court. Often times they are asked to provide video image enhancement as well for identification purposes. &lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;A variety of video enhancement techniques can be applied in different arrangements on CCTV Surveillance video evidence. The most important ingredient to this forensic process is maintaining the highest quality of the video evidence. This yields the highest success possible throughout the investigation. &lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;a href=&quot;http://cellularforensics.co.za/&quot;&gt;DLA&lt;/a&gt;&amp;nbsp;will now be an Africa exclusive agent for &lt;a href=&quot;https://www.motiondsp.com/ikena-forensic/&quot;&gt;Ikena Forensic Software&lt;/a&gt;. Not only does&amp;nbsp;&lt;a href=&quot;https://www.motiondsp.com/ikena-forensic/&quot;&gt;Ikena&lt;/a&gt;&amp;nbsp;offer some of the best software programs available today, but full enhancement of your videos and images will always be possible!&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;text-align: center;&quot;&gt;&lt;img alt=&quot;Image result&quot; height=&quot;200&quot; src=&quot;http://i.huffpost.com/gen/1499467/images/o-GUY-TYPING-facebook.jpg&quot; width=&quot;400&quot; /&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;b&gt;Scaling/Pixel Interpolation:&lt;/b&gt;&amp;nbsp;Re-size, or scale an image or video to a larger resolution to further identify suspects.&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;b&gt;Sharpening:&lt;/b&gt;&amp;nbsp;Enhances the edge contrast of an image or video.&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;b&gt;Stabilization:&lt;/b&gt;&amp;nbsp;This is most common today with smart phone video evidence. It reduces the amount of movement from the user that created the video evidence.&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;b&gt;Frame Averaging:&lt;/b&gt;&amp;nbsp;Increase the quality of the image by combining data from surrounding frames as well as a better signal to noise ratio in your images or videos.&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;b&gt;Speed Reduction:&lt;/b&gt;&amp;nbsp;Decrease the original playback of video evidence to view the events as they occurred in more detail.&amp;nbsp;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;If you have a video that you question or need help understanding, please give &lt;a href=&quot;http://cellularforensics.co.za/&quot;&gt;DLA&lt;/a&gt; a call! &lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;Take a look at the Ikena software at work:&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;a href=&quot;http://cellularforensics.co.za/component/allvideoshare/video/01-enhancing-security-camera-video-evidence-of-a-license-plate&quot;&gt;http://cellularforensics.co.za/component/allvideoshare/video/01-enhancing-security-camera-video-evidence-of-a-license-plate&lt;/a&gt;</content><link rel='replies' type='application/atom+xml' href='http://dla-digitalforensics.blogspot.com/feeds/6910123150245395642/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://dla-digitalforensics.blogspot.com/2016/09/forensic-video-enhancement-techniques.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8093875796213061342/posts/default/6910123150245395642'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8093875796213061342/posts/default/6910123150245395642'/><link rel='alternate' type='text/html' href='http://dla-digitalforensics.blogspot.com/2016/09/forensic-video-enhancement-techniques.html' title='Forensic Video Enhancement Techniques'/><author><name>Christine Romans</name><uri>https://plus.google.com/105596798670349217388</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//lh6.googleusercontent.com/-Nf4Jeogi-rg/AAAAAAAAAAI/AAAAAAAAFaQ/B5KkrDcY2m8/s512-c/photo.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8093875796213061342.post-6348006391399917142</id><published>2016-09-01T10:48:00.001+02:00</published><updated>2016-09-01T10:48:47.592+02:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="digital forensic software"/><category scheme="http://www.blogger.com/atom/ns#" term="digital forensic video"/><category scheme="http://www.blogger.com/atom/ns#" term="digital forensics"/><category scheme="http://www.blogger.com/atom/ns#" term="DLA"/><category scheme="http://www.blogger.com/atom/ns#" term="forensic software"/><category scheme="http://www.blogger.com/atom/ns#" term="forensic video"/><category scheme="http://www.blogger.com/atom/ns#" term="Ikena"/><category scheme="http://www.blogger.com/atom/ns#" term="Ikena Africa"/><category scheme="http://www.blogger.com/atom/ns#" term="Ikena forensic software"/><category scheme="http://www.blogger.com/atom/ns#" term="Ikena video enhancement"/><category scheme="http://www.blogger.com/atom/ns#" term="video enhancement"/><title type='text'>How to Extract Clear Facts from Bad Video</title><content type='html'>&lt;div class=&quot;MsoNormal&quot;&gt;There are hundreds of programs out there claiming to be able to improve video quality, but most don&#39;t have the magic answer to your situation.&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://www.motiondsp.com/wp-content/uploads/sites/default/files/styles/large/public/products/for02.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;Image result&quot; border=&quot;0&quot; height=&quot;360&quot; src=&quot;https://www.motiondsp.com/wp-content/uploads/sites/default/files/styles/large/public/products/for02.jpg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;Limited time and budgets prevent the application of the best software solution. To address this, DLA Digital Forensics has become an Africa exclusive agent for Ikena Forensic Software. &lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;The Ikena Software gives digital forensic experts the tools to enhance videos from anything, including security cameras, mobile phones and body cams. Your video can be enhanced to allow you to see important details, like the face of a criminal or the license plate of a getaway vehicle.&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;Do you want to see how the Ikena Forensic Software works? Take a look at the video below...&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;iframe width=&quot;320&quot; height=&quot;266&quot; class=&quot;YOUTUBE-iframe-video&quot; data-thumbnail-src=&quot;https://i.ytimg.com/vi/5wB9JXtIGco/0.jpg&quot; src=&quot;https://www.youtube.com/embed/5wB9JXtIGco?feature=player_embedded&quot; frameborder=&quot;0&quot; allowfullscreen&gt;&lt;/iframe&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;This powerful forensic tool delivers clear evidence and a greater understanding of how and why each process works.&amp;nbsp; The digital forensic experts at DLA can optimize and automate nearly every step, thus reducing working time, eliminating judgment-based errors, and ensuring an accurate reproducible set of facts.&amp;nbsp; That is what the industry is all about!&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://dla-digitalforensics.blogspot.com/feeds/6348006391399917142/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://dla-digitalforensics.blogspot.com/2016/09/how-to-extract-clear-facts-from-bad.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8093875796213061342/posts/default/6348006391399917142'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8093875796213061342/posts/default/6348006391399917142'/><link rel='alternate' type='text/html' href='http://dla-digitalforensics.blogspot.com/2016/09/how-to-extract-clear-facts-from-bad.html' title='How to Extract Clear Facts from Bad Video'/><author><name>Christine Romans</name><uri>https://plus.google.com/105596798670349217388</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//lh6.googleusercontent.com/-Nf4Jeogi-rg/AAAAAAAAAAI/AAAAAAAAFaQ/B5KkrDcY2m8/s512-c/photo.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://img.youtube.com/vi/5wB9JXtIGco/default.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8093875796213061342.post-4485108764981925294</id><published>2016-08-31T11:44:00.002+02:00</published><updated>2016-08-31T15:22:58.721+02:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="digital forensic specialist"/><category scheme="http://www.blogger.com/atom/ns#" term="digital forensics"/><category scheme="http://www.blogger.com/atom/ns#" term="digital forensics cape town"/><category scheme="http://www.blogger.com/atom/ns#" term="DLA"/><category scheme="http://www.blogger.com/atom/ns#" term="DLA video enhancement"/><category scheme="http://www.blogger.com/atom/ns#" term="forensic video"/><category scheme="http://www.blogger.com/atom/ns#" term="Ikena"/><category scheme="http://www.blogger.com/atom/ns#" term="Ikena Africa"/><category scheme="http://www.blogger.com/atom/ns#" term="Ikena video enhancement"/><category scheme="http://www.blogger.com/atom/ns#" term="video enhancement"/><category scheme="http://www.blogger.com/atom/ns#" term="video enhancement Africa"/><title type='text'>Video Enhancement: What is and is not possible</title><content type='html'>&lt;div class=&quot;MsoNormal&quot;&gt;Digital forensic and video enhancement specialists are asked on a regular basis to enhance images that have been recorded.&lt;br /&gt;&lt;br /&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;img alt=&quot;Image result&quot; src=&quot;http://amaznginfo.com/wp-content/uploads/2016/02/working-at-computer.jpg&quot; height=&quot;423&quot; width=&quot;640&quot; /&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;One of the goals of video enhancement, in some cases, is to be able to see persons faces better than they are when viewing the video under normal circumstances. Other times they are asked to enlarge and clarify a video in order to identify, for instance, the license plate on a car that is alleged to be involved in criminal activity.&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;With video enhancement, forensic experts can only do so much. In a lot of cases, the video that has been exported from the surveillance system is small and when enlarged, or zoomed in on the objects of interest they become very blurry and distorted. &lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;BUT, we are proud to announce that our forensic experts at &lt;a href=&quot;http://cellularforensics.co.za/&quot;&gt;DLA&lt;/a&gt; will now be an Africa exclusive agent for Ikena Forensic Software! Not only does &lt;a href=&quot;https://www.motiondsp.com/ikena-forensic/&quot;&gt;Ikena&lt;/a&gt; offer some of the best software programs available today, they also insist that full enhancement of your videos and images will always be possible!&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;Now you no longer have to stress about not having the highest possible quality surveillance system and video – Take a look below to see Ikena video enhancement in action...&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;iframe allowfullscreen=&quot;&quot; class=&quot;YOUTUBE-iframe-video&quot; data-thumbnail-src=&quot;https://i.ytimg.com/vi/qMhGzaPhTKk/0.jpg&quot; frameborder=&quot;0&quot; height=&quot;266&quot; src=&quot;https://www.youtube.com/embed/qMhGzaPhTKk?feature=player_embedded&quot; width=&quot;320&quot;&gt;&lt;/iframe&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;iframe allowfullscreen=&quot;&quot; class=&quot;YOUTUBE-iframe-video&quot; data-thumbnail-src=&quot;https://i.ytimg.com/vi/__ws59m5sd4/0.jpg&quot; frameborder=&quot;0&quot; height=&quot;266&quot; src=&quot;https://www.youtube.com/embed/__ws59m5sd4?feature=player_embedded&quot; width=&quot;320&quot;&gt;&lt;/iframe&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://dla-digitalforensics.blogspot.com/feeds/4485108764981925294/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://dla-digitalforensics.blogspot.com/2016/08/video-enhancement-what-is-and-is-not.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8093875796213061342/posts/default/4485108764981925294'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8093875796213061342/posts/default/4485108764981925294'/><link rel='alternate' type='text/html' href='http://dla-digitalforensics.blogspot.com/2016/08/video-enhancement-what-is-and-is-not.html' title='Video Enhancement: What is and is not possible'/><author><name>Christine Romans</name><uri>https://plus.google.com/105596798670349217388</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//lh6.googleusercontent.com/-Nf4Jeogi-rg/AAAAAAAAAAI/AAAAAAAAFaQ/B5KkrDcY2m8/s512-c/photo.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://img.youtube.com/vi/qMhGzaPhTKk/default.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8093875796213061342.post-4126003473532331484</id><published>2016-08-24T10:57:00.001+02:00</published><updated>2016-08-24T10:57:25.057+02:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="digital evidence"/><category scheme="http://www.blogger.com/atom/ns#" term="DLA"/><category scheme="http://www.blogger.com/atom/ns#" term="DLA Cape Town"/><category scheme="http://www.blogger.com/atom/ns#" term="DLA Digital Forensics"/><category scheme="http://www.blogger.com/atom/ns#" term="how is digital evidence done"/><category scheme="http://www.blogger.com/atom/ns#" term="mobile forensics"/><category scheme="http://www.blogger.com/atom/ns#" term="mobile forensics Cape Town"/><category scheme="http://www.blogger.com/atom/ns#" term="what is digital evidence"/><title type='text'>Digital Evidence – How It’s Done</title><content type='html'>&lt;div class=&quot;MsoNormal&quot;&gt;Computer documents, emails, text and instant messages, transactions, images and Internet histories are examples of information that can be gathered from electronic devices and used very effectively as evidence.&amp;nbsp;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;text-align: center;&quot;&gt;&lt;img height=&quot;338&quot; src=&quot;http://images.atelier.net/sites/default/files/imagecache/scale_crop_587_310/articles/shutterstock_98135546.jpg&quot; width=&quot;640&quot; /&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;For example, mobile devices use online-based based backup systems, also known as the “cloud”, that provide forensic investigators with access to text / messaging app messages and pictures taken from a particular phone. These systems keep an average of 1,000–1,500 or more of the last text messages sent to and received from that phone.&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;In addition, many mobile devices store information about the locations where the device travelled and when it was there. To gain this knowledge, investigators can access an average of the last 200 cell locations accessed by a mobile device. Satellite navigation systems and satellite radios in cars can provide similar information. Even photos posted to social media such as Facebook or Instagram may contain location information.&amp;nbsp;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;Photos taken with a Global Positioning System (GPS)-enabled device contain file data that shows when and exactly where a photo was taken.&amp;nbsp;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;text-align: center;&quot;&gt;&lt;img height=&quot;426&quot; src=&quot;https://static.pexels.com/photos/6363/man-hands-working-technology.jpg&quot; width=&quot;640&quot; /&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;Investigators can collect a great deal of history related to a device and the person using it!&lt;/div&gt;&lt;br /&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;a href=&quot;http://cellularforensics.co.za/&quot;&gt;DLA&lt;/a&gt; is based in Cape Town and combines the experience of two seasoned investigators with both criminal and civil backgrounds with the latest technologies to achieve the results that you require.</content><link rel='replies' type='application/atom+xml' href='http://dla-digitalforensics.blogspot.com/feeds/4126003473532331484/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://dla-digitalforensics.blogspot.com/2016/08/digital-evidence-how-its-done.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8093875796213061342/posts/default/4126003473532331484'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8093875796213061342/posts/default/4126003473532331484'/><link rel='alternate' type='text/html' href='http://dla-digitalforensics.blogspot.com/2016/08/digital-evidence-how-its-done.html' title='Digital Evidence – How It’s Done'/><author><name>Christine Romans</name><uri>https://plus.google.com/105596798670349217388</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//lh6.googleusercontent.com/-Nf4Jeogi-rg/AAAAAAAAAAI/AAAAAAAAFaQ/B5KkrDcY2m8/s512-c/photo.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8093875796213061342.post-8462880767481531803</id><published>2016-08-03T23:30:00.000+02:00</published><updated>2016-08-03T23:30:29.219+02:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="DLA"/><category scheme="http://www.blogger.com/atom/ns#" term="DLA Cape Town"/><category scheme="http://www.blogger.com/atom/ns#" term="DLA Digital Forensics"/><category scheme="http://www.blogger.com/atom/ns#" term="DLA investigators"/><category scheme="http://www.blogger.com/atom/ns#" term="Recovery of WhatsApp History"/><category scheme="http://www.blogger.com/atom/ns#" term="WhatsApp"/><category scheme="http://www.blogger.com/atom/ns#" term="WhatsApp chat history"/><category scheme="http://www.blogger.com/atom/ns#" term="whatsapp deleted messages"/><category scheme="http://www.blogger.com/atom/ns#" term="whatsapp messages"/><title type='text'>Your deleted WhatsApp messages might not be as &#39;deleted&#39; as you thought</title><content type='html'>&lt;div class=&quot;MsoNormal&quot;&gt;Sometimes, the delete option is your best friend.&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;a href=&quot;http://www.whatsapp.com/&quot;&gt;WhatsApp&lt;/a&gt; brought you the two-tick (so you can’t hide the fact that you’ve received a message) and then the blue ticks (so you can’t hide the fact that you’ve read a message).&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;In April - despite much controversy following the San Bernadino attack, in which the FBI had paid&amp;nbsp;almost £1 million&amp;nbsp;to unlock the iPhone used by one of the shooters - WhatsApp went ahead with end-to-end encryption.&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;This means that while you can’t hide your ghosting antics from the person in question, you can hide your messages from third parties.&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;But according to a new blog post, an iOS device might actually still store your &quot;deleted&quot; messages.&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;The data works similarly to your laptop’s hard drive: you might be able to delete the WhatsApp messages, but deleting it doesn&#39;t overwrite the data, which means it can still be retrieved.&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;When you backup your iPhone with iCloud the data gets copied to a less secure forum.&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;While the information can’t necessarily be accessed by a third party, it is still stored locally on your device which means that the only real way to get rid of it is by deleting the app.&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;Even then, the police can still potentially access it.&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;text-align: center;&quot;&gt;&lt;img height=&quot;430&quot; src=&quot;http://mybroadband.co.za/news/wp-content/uploads/2016/03/Whatsapp-on-phone-in-hand.jpg&quot; width=&quot;640&quot; /&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;Law enforcement can potentially issue a warrant with Apple to obtain your deleted WhatsApp chat logs, which may include deleted messages.&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;Basically, the delete option may not be that great friend after all.&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;a href=&quot;http://cellularforensics.co.za/&quot;&gt;DLA&lt;/a&gt; is based in Cape Town and combines the experience of two seasoned investigators with both criminal and civil backgrounds with the latest technologies to achieve the results that you require.</content><link rel='replies' type='application/atom+xml' href='http://dla-digitalforensics.blogspot.com/feeds/8462880767481531803/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://dla-digitalforensics.blogspot.com/2016/08/your-deleted-whatsapp-messages-might.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8093875796213061342/posts/default/8462880767481531803'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8093875796213061342/posts/default/8462880767481531803'/><link rel='alternate' type='text/html' href='http://dla-digitalforensics.blogspot.com/2016/08/your-deleted-whatsapp-messages-might.html' title='Your deleted WhatsApp messages might not be as &#39;deleted&#39; as you thought'/><author><name>Christine Romans</name><uri>https://plus.google.com/105596798670349217388</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//lh6.googleusercontent.com/-Nf4Jeogi-rg/AAAAAAAAAAI/AAAAAAAAFaQ/B5KkrDcY2m8/s512-c/photo.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8093875796213061342.post-4784665176995010661</id><published>2016-07-20T15:46:00.000+02:00</published><updated>2016-07-20T15:46:00.431+02:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="computer forensics"/><category scheme="http://www.blogger.com/atom/ns#" term="cyber crime"/><category scheme="http://www.blogger.com/atom/ns#" term="Digital forensic experts"/><category scheme="http://www.blogger.com/atom/ns#" term="digital forensic investigators"/><category scheme="http://www.blogger.com/atom/ns#" term="DLA"/><category scheme="http://www.blogger.com/atom/ns#" term="DLA Cape Town"/><category scheme="http://www.blogger.com/atom/ns#" term="DLA computer forensics"/><category scheme="http://www.blogger.com/atom/ns#" term="DLA Digital Forensics"/><category scheme="http://www.blogger.com/atom/ns#" term="what is computer forensics"/><title type='text'>What Exactly is Computer Forensics?</title><content type='html'>&lt;div class=&quot;MsoNormal&quot;&gt;The field of computer forensics has grown to become a science in itself. Computer forensics is also known as cyber forensics. It involves applying computer investigation and analysis techniques to solve a crime and provide evidence to support a case. Investigators often use proprietary forensic applications and software programs to examine computer hard drives, extract certain types of data from files and folders, and also to recover information from encrypted files. This digital information must be organized and documented into an official report form to be presented in a court of law.&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;b&gt;Computer Forensics Defined&lt;o:p&gt;&lt;/o:p&gt;&lt;/b&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;The computer forensics definition can be broken down into several technical aspects of the actual science of computer forensics. The general definition of computer forensics is the processes and investigative methods used to find digital evidence and prepare it for legal proceedings. The more in-depth definition includes the preservation of media and data, identification of computer-related evidence, extraction of the data and interpretation. Interpretation is perhaps the most important element of the computer forensics definition because this is where forensics experts must draw conclusions from a formal forensic analysis.&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;Throughout the process of data gathering and interpretation, the computer forensics specialist must document everything in a structured fashion. They must report exactly what types of investigations were performed and document all of the steps taken to retrieve various files, folders and data. The courts can then apply various types of methodology and testimonies in order to determine whether evidence presented can actually be used in the legal proceedings. This is why computer forensics specialists must learn about the different legal processes involved in an investigation and make sure that there is always a high level of integrity of evidence.&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;b&gt;Why the Computer Forensics Definition Can Change&lt;o:p&gt;&lt;/o:p&gt;&lt;/b&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;It&#39;s important to recognize that there are two main types of computer forensics investigations so the computer forensics definition can change. The first involves investigations where a computer or digital technologies were used to perform the crime (cybercrime). The second is when a computer is used as the target of a crime, such as when a hacker retrieves sensitive information or someone has their identity stolen online. In both of these situations, the computer forensics definition may change slightly because the investigator uses different techniques and methodologies to solve the crime.&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;text-align: center;&quot;&gt;&lt;img height=&quot;300&quot; src=&quot;http://www.uokufa.edu.iq/it/images/Digital%20forensics.jpg&quot; width=&quot;640&quot; /&gt;&lt;/div&gt;&lt;br /&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;o:p&gt;The digital forensic experts from &lt;a href=&quot;http://cellularforensics.co.za/&quot;&gt;DLA&lt;/a&gt; use their knowledge of investigation and forensic software to find and reveal the computer or mobile forensic evidence that your require.&lt;/o:p&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://dla-digitalforensics.blogspot.com/feeds/4784665176995010661/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://dla-digitalforensics.blogspot.com/2016/07/what-exactly-is-computer-forensics.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8093875796213061342/posts/default/4784665176995010661'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8093875796213061342/posts/default/4784665176995010661'/><link rel='alternate' type='text/html' href='http://dla-digitalforensics.blogspot.com/2016/07/what-exactly-is-computer-forensics.html' title='What Exactly is Computer Forensics?'/><author><name>Christine Romans</name><uri>https://plus.google.com/105596798670349217388</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//lh6.googleusercontent.com/-Nf4Jeogi-rg/AAAAAAAAAAI/AAAAAAAAFaQ/B5KkrDcY2m8/s512-c/photo.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8093875796213061342.post-7035508526965556700</id><published>2016-07-14T08:47:00.000+02:00</published><updated>2016-07-14T08:47:16.893+02:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Cyberstalking"/><category scheme="http://www.blogger.com/atom/ns#" term="digital forensics"/><category scheme="http://www.blogger.com/atom/ns#" term="digital stalking"/><category scheme="http://www.blogger.com/atom/ns#" term="DLA"/><category scheme="http://www.blogger.com/atom/ns#" term="DLA Cape Town"/><category scheme="http://www.blogger.com/atom/ns#" term="DLA Digital Forensics"/><category scheme="http://www.blogger.com/atom/ns#" term="internet predators"/><category scheme="http://www.blogger.com/atom/ns#" term="mobile stalking"/><category scheme="http://www.blogger.com/atom/ns#" term="stalking"/><title type='text'>Straight Talk About Cyberstalking</title><content type='html'>&lt;div class=&quot;MsoNormal&quot;&gt;Cyberstalking includes (repeatedly) sending threats or false accusations via email or mobile phone, making threatening or false posts on websites, stealing a person’s identity or data or spying and monitoring a person’s computer and internet use. Sometimes the threats can escalate into physical spaces.&lt;br /&gt;&lt;br /&gt;&lt;img height=&quot;376&quot; src=&quot;http://www.southerncaliforniadefenseblog.com/files/2014/11/Cyberstalking.jpg&quot; width=&quot;640&quot; /&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-ZA&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-ZA&quot;&gt;There are just as many predators on the internet as there are in real life. Anyone can be stalked online but the majority of victims as in life offline are female. Stalking estimates show that 80% of stalking victims are women.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-ZA&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-ZA&quot;&gt;And the perpetrators are not just strangers. They can also be former, estranged or current partners, boyfriends or husbands. Domestic violence victims are one of the most vulnerable groups to traditional stalking so it’s no surprise they are vulnerable to cyberstalking as well.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-ZA&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-ZA&quot;&gt;As in other types of violence against women, cyberstalking is about power relations, intimidation and establishing control. If you are being stalked, know first and foremost that you did&amp;nbsp;NOT&amp;nbsp;“provoke” this harassment.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-ZA&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-ZA&quot;&gt;How can I prevent someone from stalking me online?&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-ZA&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;b&gt;&lt;span lang=&quot;EN-ZA&quot;&gt;- Be careful what personal information you share&lt;/span&gt;&lt;/b&gt;&lt;span lang=&quot;EN-ZA&quot;&gt; online&amp;nbsp;including in email, on social networking sites like Facebook, Twitter, Instagram, etc. It is very easy to glean information about where you live, the places you love to go to in your area and the people you care about from posts and pictures.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-ZA&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;b&gt;&lt;span lang=&quot;EN-ZA&quot;&gt;- Create a different email account for registering in social networking sites&lt;/span&gt;&lt;/b&gt;&lt;span lang=&quot;EN-ZA&quot;&gt;&amp;nbsp;and other online spaces. It will help avoid spam and your personal email won´t be revealed if the online service doesn’t have a good privacy practice.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-ZA&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;b&gt;&lt;span lang=&quot;EN-ZA&quot;&gt;- Do not feel obligated to fill out all fields when registering online&lt;/span&gt;&lt;/b&gt;&lt;span lang=&quot;EN-ZA&quot;&gt;&amp;nbsp;or provide identifying information such as birthdates and place in required fields.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-ZA&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;b&gt;&lt;span lang=&quot;EN-ZA&quot;&gt;- In your online user profile, use a photo that doesn’t identify you&amp;nbsp;or your location&lt;/span&gt;&lt;/b&gt;&lt;span lang=&quot;EN-ZA&quot;&gt;, so you can’t be recognised.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-ZA&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;b&gt;&lt;span lang=&quot;EN-ZA&quot;&gt;- Consider using a name that is not your real name&lt;/span&gt;&lt;/b&gt;&lt;span lang=&quot;EN-ZA&quot;&gt;&amp;nbsp;or a nickname as your email name, screen name or user ID. And try not to use common dates such as your birthday as the digits in your email name or password. Instead, pick a name that is gender- and age-neutral. Treat your email and/or internet account like you would your credit card, ID or passport number – very carefully.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-ZA&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-ZA&quot;&gt;- If you are breaking up with an intimate partner&amp;nbsp;– especially if they are abusive, troubled, angry or difficult –&amp;nbsp;&lt;b&gt;reset every single password on all of your accounts,&amp;nbsp;from email and social networking accounts to bank accounts&lt;/b&gt;, to something they cannot guess.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-ZA&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-ZA&quot;&gt;- Services such as Facebook change their privacy policy all the time, so it is a good idea to &lt;b&gt;check your privacy settings&lt;/b&gt;&amp;nbsp;to make sure you are sharing the information you want to share with people you trust and not the general internet public. Some sites have options for you to test how your profile is being viewed by others – test and make sure you only reveal what is absolutely necessary.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-ZA&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-ZA&quot;&gt;- What information are family and friends posting about you?&amp;nbsp;Let them know your concerns about privacy and &lt;b&gt;help them learn better privacy settings.&lt;o:p&gt;&lt;/o:p&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-ZA&quot;&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;b&gt;&lt;span lang=&quot;EN-ZA&quot;&gt;- Do an internet search of your name regularly&amp;nbsp;and monitor where you appear online. &lt;/span&gt;&lt;/b&gt;&lt;span lang=&quot;EN-ZA&quot;&gt;If you find unauthorised info about yourself online, contact the website moderator to request its removal.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-ZA&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;b&gt;&lt;span lang=&quot;EN-ZA&quot;&gt;- Make sure that your internet service provider (ISP), cell phone service, instant messenger&amp;nbsp;(called internet relay chat, or&amp;nbsp;IRC&amp;nbsp;in some terms of service)&amp;nbsp;network and other services you use has an acceptable privacy policy that prohibits cyberstalking.&lt;/span&gt;&lt;/b&gt;&lt;span lang=&quot;EN-ZA&quot;&gt;&amp;nbsp;If they have none, suggest they create one and/or switch to a provider that is more responsive to user privacy concerns and complaints.&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-ZA&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-ZA&quot;&gt;&lt;a href=&quot;http://cellularforensics.co.za/&quot;&gt;Digital forensics&lt;/a&gt; takes much more than an average knowledge of all things digi&lt;/span&gt;tal, it requires a thorough understanding of investigative process, the law of evidence and of naturally the appropriate background to criminal and civil investigations.&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;Contact &lt;a href=&quot;http://cellularforensics.co.za/&quot;&gt;DLA&lt;/a&gt; today and let us follow the digital trail to find the evidence you need!&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://dla-digitalforensics.blogspot.com/feeds/7035508526965556700/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://dla-digitalforensics.blogspot.com/2016/07/straight-talk-about-cyberstalking.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8093875796213061342/posts/default/7035508526965556700'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8093875796213061342/posts/default/7035508526965556700'/><link rel='alternate' type='text/html' href='http://dla-digitalforensics.blogspot.com/2016/07/straight-talk-about-cyberstalking.html' title='Straight Talk About Cyberstalking'/><author><name>Christine Romans</name><uri>https://plus.google.com/105596798670349217388</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//lh6.googleusercontent.com/-Nf4Jeogi-rg/AAAAAAAAAAI/AAAAAAAAFaQ/B5KkrDcY2m8/s512-c/photo.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8093875796213061342.post-3124713870514095221</id><published>2016-07-06T14:15:00.001+02:00</published><updated>2016-07-06T14:15:16.134+02:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="computer evidence"/><category scheme="http://www.blogger.com/atom/ns#" term="computer forensics"/><category scheme="http://www.blogger.com/atom/ns#" term="computer investigators"/><category scheme="http://www.blogger.com/atom/ns#" term="digital forensics"/><category scheme="http://www.blogger.com/atom/ns#" term="digital investigators"/><category scheme="http://www.blogger.com/atom/ns#" term="DLA"/><category scheme="http://www.blogger.com/atom/ns#" term="DLA computer forensics"/><category scheme="http://www.blogger.com/atom/ns#" term="DLA Digital Forensics"/><category scheme="http://www.blogger.com/atom/ns#" term="mobile forensics"/><title type='text'>When should you consider using computer forensics?</title><content type='html'>&lt;div class=&quot;MsoNormal&quot;&gt;If any form of digital information is even remotely involved in a case or legal situation, a computer forensic examination will be required. Digital information has invaded virtually every aspect of our day-to-day existence, having become a basic component of our lives, from computers, to smartphones, to social networking, digital information plays a crucial role in almost every case.&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-ZA&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-ZA&quot;&gt;Computer forensics differs from data recovery, which is, recovery of data after an event affecting the physical data, such as a hard drive crash. Computer forensics goes much further. Computer forensics is a complete computer examination with intricate analysis of digital information being the ultimate goal.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-ZA&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;text-align: center;&quot;&gt;&lt;span lang=&quot;EN-ZA&quot;&gt;&lt;img height=&quot;360&quot; src=&quot;https://udemy-images.udemy.com/course/750x422/62109_9be0_8.jpg&quot; width=&quot;640&quot; /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-ZA&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-ZA&quot;&gt;For a successful forensics examination, you must have all the information relevant to a matter, not only to construct effective legal strategies, but also to focus your expectations and efficiently budget your services. There is nothing more difficult to address than a case which has become complicated by new facts, where you once expected the matter to proceed smoothly and without significant cost. Knowing all the facts early in a matter, allows you to better prepare for those cases that will require significant legal expertise to manage.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-ZA&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-ZA&quot;&gt;In response to pending litigation, analysing your relevant ESI is an excellent way to discharge your duties to preserve evidence and avoid spoliation, while also acquiring all relevant information essential to your legal theories and strategies. Similarly, as part of critical business decisions, forensically analysing relevant computers and devices can provide essential information. For example, analysing the computers of corporate officers or employees as part of the termination process can alert you to possible litigation issues such as violation of non-compete agreements, improper copying of intellectual property, etc.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-ZA&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-ZA&quot;&gt;To prepare for litigation, an attorney ought to determine whether a Request for Production of Documents will obtain all relevant evidence. A simple question to ask is whether you want to discover part of the relevant information (i.e. visible by your opponent’s operating system) or all of it (deleted, hidden, orphaned data, etc). It is not unrealistic to anticipate that information contained on a computer system which is helpful to a matter would be saved, while that which is harmful would be deleted, hidden, or rendered invisible. For example, in sexual harassment cases, it is not unusual to discover deleted emails and other data invisible to the operating system that significantly impacts the case. Computer forensic analysis extracts all the emails, memos, and other data that can be viewed with the operating system, as well as all invisible data. In many cases, the invisible data completely changes the nature of a claim or defense, often leading to early settlement and avoiding surprises during litigation.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-ZA&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-ZA&quot;&gt;In any situation in which one or more computers may have been used in an inappropriate manner, it is essential to call a forensic expert. Only a computer forensic analyst will be able to preserve, extract, and analyze the vital data that records the “tracks” left behind by inappropriate use. Taking the wrong steps in these circumstances can irrevocably destroy the vestiges of wrongful use that may result in litigation or criminal prosecution.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;br /&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-ZA&quot;&gt;Digital, computer and mobile forensics requires much more than what you may think. At &lt;a href=&quot;http://cellularforensics.co.za/&quot;&gt;DLA,&lt;/a&gt; our seasoned investigators use a special set of skills and tools to recover or find the digital data that you need!&lt;/span&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://dla-digitalforensics.blogspot.com/feeds/3124713870514095221/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://dla-digitalforensics.blogspot.com/2016/07/when-should-you-consider-using-computer.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8093875796213061342/posts/default/3124713870514095221'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8093875796213061342/posts/default/3124713870514095221'/><link rel='alternate' type='text/html' href='http://dla-digitalforensics.blogspot.com/2016/07/when-should-you-consider-using-computer.html' title='When should you consider using computer forensics?'/><author><name>Christine Romans</name><uri>https://plus.google.com/105596798670349217388</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//lh6.googleusercontent.com/-Nf4Jeogi-rg/AAAAAAAAAAI/AAAAAAAAFaQ/B5KkrDcY2m8/s512-c/photo.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8093875796213061342.post-4293650570398644668</id><published>2016-06-29T14:15:00.001+02:00</published><updated>2016-06-29T14:19:47.426+02:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="computer evidence"/><category scheme="http://www.blogger.com/atom/ns#" term="computer forensics"/><category scheme="http://www.blogger.com/atom/ns#" term="computer forensics evidence"/><category scheme="http://www.blogger.com/atom/ns#" term="computer forensics investigator"/><category scheme="http://www.blogger.com/atom/ns#" term="digital forensics"/><category scheme="http://www.blogger.com/atom/ns#" term="digital forensics cape town"/><category scheme="http://www.blogger.com/atom/ns#" term="DLA"/><title type='text'>How Computer Forensics Works - Standards of Evidence</title><content type='html'>&lt;div class=&quot;MsoNormal&quot;&gt;If the investigators believe the computer system is only acting as a storage device, they usually aren&#39;t allowed to seize the&amp;nbsp;hardware&amp;nbsp;itself. This limits any evidence investigation to the field. On the other hand, if the investigators believe the hardware itself is evidence, they can seize the hardware and bring it to another location. For example, if the computer is stolen property, then the investigators could seize the hardware.&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;text-align: center;&quot;&gt;&lt;img src=&quot;http://jurinnov.com/wp-content/uploads/2011/07/Computer-forensics-cleveland-ohio-washington-dc.jpg&quot; height=&quot;244&quot; width=&quot;640&quot; /&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-ZA&quot;&gt;In order to use evidence from a computer system in court, the prosecution must&amp;nbsp;authenticate&amp;nbsp;the evidence. That is, the prosecution must be able to prove that the information presented as evidence came from the suspect&#39;s computer and that it remains unaltered.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-ZA&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-ZA&quot;&gt;Although it&#39;s generally acknowledged that tampering with computer data is both possible and relatively simple to do, the courts so far haven&#39;t discounted computer evidence completely. Rather, the courts require proof or evidence of tampering before dismissing computer evidence.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-ZA&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-ZA&quot;&gt;Another consideration the courts take into account with computer evidence is&amp;nbsp;hearsay. Hearsay is a term referring to statements made outside of a court of law. In most cases, courts can&#39;t allow hearsay as evidence. The courts have determined that information on a computer does not constitute hearsay in most cases, and is therefore admissible. &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-ZA&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-ZA&quot;&gt;If the computer records include human-generated statements like&amp;nbsp;e-mail&amp;nbsp;messages, the court must determine if the statements can be considered trustworthy before allowing them as evidence. Courts determine this on a case-by-case basis.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;br /&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;a href=&quot;http://cellularforensics.co.za/&quot;&gt;DLA&lt;/a&gt; is based in Cape Town and combines the experience of two seasoned investigators with both criminal and civil backgrounds with the latest technologies to follow the electronic trail and find the digital evidence you need!</content><link rel='replies' type='application/atom+xml' href='http://dla-digitalforensics.blogspot.com/feeds/4293650570398644668/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://dla-digitalforensics.blogspot.com/2016/06/how-computer-forensics-works-standards.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8093875796213061342/posts/default/4293650570398644668'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8093875796213061342/posts/default/4293650570398644668'/><link rel='alternate' type='text/html' href='http://dla-digitalforensics.blogspot.com/2016/06/how-computer-forensics-works-standards.html' title='How Computer Forensics Works - Standards of Evidence'/><author><name>Christine Romans</name><uri>https://plus.google.com/105596798670349217388</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//lh6.googleusercontent.com/-Nf4Jeogi-rg/AAAAAAAAAAI/AAAAAAAAFaQ/B5KkrDcY2m8/s512-c/photo.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8093875796213061342.post-8334342474264187549</id><published>2016-06-22T13:59:00.001+02:00</published><updated>2016-06-22T14:02:02.161+02:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="computer forensics"/><category scheme="http://www.blogger.com/atom/ns#" term="computer forensics investigation"/><category scheme="http://www.blogger.com/atom/ns#" term="digital forensic investigators"/><category scheme="http://www.blogger.com/atom/ns#" term="digital forensics"/><category scheme="http://www.blogger.com/atom/ns#" term="digital forensics cape town"/><category scheme="http://www.blogger.com/atom/ns#" term="DLA"/><category scheme="http://www.blogger.com/atom/ns#" term="DLA computer forensics"/><category scheme="http://www.blogger.com/atom/ns#" term="DLA Digital Forensics"/><title type='text'>How Computer Forensics Works - Phases of a Computer Forensics Investigation</title><content type='html'>&lt;div class=&quot;MsoNormal&quot;&gt;The experts at&lt;a href=&quot;http://cellularforensics.co.za/&quot;&gt; DLA&lt;/a&gt; listed the following steps every digital forensic investigators should follow to retrieve digital evidence:&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;text-align: center;&quot;&gt;&lt;img src=&quot;http://www.nscitgroup.com/wp-content/uploads/2015/10/computer-forensics.jpg&quot; height=&quot;424&quot; width=&quot;640&quot; /&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-ZA&quot;&gt;&lt;b&gt;1. &lt;/b&gt;Secure the computer system to ensure that the equipment and data are safe. This means the detectives must make sure that no unauthorized individual can access the computers or storage devices involved in the search. If the computer system connects to the&amp;nbsp;Internet, detectives must sever the connection.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-ZA&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-ZA&quot;&gt;&lt;b&gt;2.&lt;/b&gt; Find every file on the computer system, including files that are&amp;nbsp;encrypted, protected by passwords, hidden or deleted, but not yet overwritten. Investigators should make a copy of all the files on the system. This includes files on the computer&#39;s&amp;nbsp;hard drive&amp;nbsp;or in other storage devices. Since accessing a file can alter it, it&#39;s important that investigators only work from copies of files while searching for evidence. The original system should remain preserved and intact.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-ZA&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-ZA&quot;&gt;&lt;b&gt;3.&lt;/b&gt; Recover as much deleted information as possible using applications that can detect and retrieve deleted data.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-ZA&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-ZA&quot;&gt;&lt;b&gt;4. &lt;/b&gt;Reveal the contents of all hidden files with programs designed to detect the presence of hidden data.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-ZA&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-ZA&quot;&gt;&lt;b&gt;5. &lt;/b&gt;Decrypt and access protected files.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-ZA&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-ZA&quot;&gt;&lt;b&gt;6.&lt;/b&gt; Analyse special areas of the computer&#39;s disks, including parts that are normally inaccessible. (In computer terms, unused space on a computer&#39;s drive is called&amp;nbsp;unallocated space. That space could contain files or parts of files that are relevant to the case.)&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-ZA&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-ZA&quot;&gt;&lt;b&gt;7.&lt;/b&gt; Document every step of the procedure. It&#39;s important for detectives to provide proof that their investigations preserved all the information on the computer system without changing or damaging it. Years can pass between an investigation and a trial, and without proper documentation, evidence may not be admissible. &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-ZA&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-ZA&quot;&gt;&lt;b&gt;8.&lt;/b&gt; Be prepared to testify in court as an expert witness in computer forensics. Even when an investigation is complete, the detectives&#39; job may not be done. &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-ZA&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-ZA&quot;&gt;All of these steps are important, but the first step is critical. If investigators can&#39;t prove that they secured the computer system, the evidence they find may not be admissible. It&#39;s also a big job. In the early days of computing, the system might have included a&amp;nbsp;PC&amp;nbsp;and a few floppy disks. Today, it could include multiple computers, disks, thumb drives, external drives, peripherals and&amp;nbsp;Web servers.&lt;/span&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://dla-digitalforensics.blogspot.com/feeds/8334342474264187549/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://dla-digitalforensics.blogspot.com/2016/06/how-computer-forensics-works-phases-of.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8093875796213061342/posts/default/8334342474264187549'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8093875796213061342/posts/default/8334342474264187549'/><link rel='alternate' type='text/html' href='http://dla-digitalforensics.blogspot.com/2016/06/how-computer-forensics-works-phases-of.html' title='How Computer Forensics Works - Phases of a Computer Forensics Investigation'/><author><name>Christine Romans</name><uri>https://plus.google.com/105596798670349217388</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//lh6.googleusercontent.com/-Nf4Jeogi-rg/AAAAAAAAAAI/AAAAAAAAFaQ/B5KkrDcY2m8/s512-c/photo.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8093875796213061342.post-8990410485962300868</id><published>2016-06-15T14:59:00.001+02:00</published><updated>2016-06-15T14:59:02.503+02:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="computer evidence"/><category scheme="http://www.blogger.com/atom/ns#" term="computer forensics"/><category scheme="http://www.blogger.com/atom/ns#" term="Computer Forensics Basics"/><category scheme="http://www.blogger.com/atom/ns#" term="computer forensics investigator"/><category scheme="http://www.blogger.com/atom/ns#" term="digital forensics"/><category scheme="http://www.blogger.com/atom/ns#" term="DLA"/><category scheme="http://www.blogger.com/atom/ns#" term="DLA Cape Town"/><category scheme="http://www.blogger.com/atom/ns#" term="DLA computer forensics"/><category scheme="http://www.blogger.com/atom/ns#" term="how does computer forensics work"/><title type='text'>Computer Forensics Basics – How it works</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://3.bp.blogspot.com/-Puq0zumduAE/V2FQ0GLJ3cI/AAAAAAAAIek/2i4Qaah4R6QIxchBvF0S4REYjT7z9aRBQCLcB/s1600/Cyberspace.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;380&quot; src=&quot;https://3.bp.blogspot.com/-Puq0zumduAE/V2FQ0GLJ3cI/AAAAAAAAIek/2i4Qaah4R6QIxchBvF0S4REYjT7z9aRBQCLcB/s400/Cyberspace.jpg&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;The purpose of computer&amp;nbsp;forensics&amp;nbsp;techniques is to search, preserve and analyze information on computer systems to find potential evidence. Many of the techniques detectives use in&amp;nbsp;crime scene investigations&amp;nbsp;have digital counterparts, but there are also some unique aspects to computer investigations.&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-ZA&quot;&gt;For example, just opening a computer file changes the file -- the computer records the time and date it was accessed on the file itself. If detectives seize a computer and then start opening files, there&#39;s no way to tell for sure that they didn&#39;t change anything. Lawyers can contest the validity of the evidence when the case goes to court.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-ZA&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-ZA&quot;&gt;Some people say that using digital information as evidence is a bad idea. If it&#39;s easy to change computer data, how can it be used as reliable evidence? Many countries allow computer evidence in trials, but that could change if digital evidence proves untrustworthy in future cases.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-ZA&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-ZA&quot;&gt;Computers are getting more powerful, so the field of computer forensics must constantly evolve. In the early days of computers, it was possible for a single detective to sort through files because storage capacity was so low. Today, with hard drives capable of holding gigabytes and even terabytes of data, that&#39;s a daunting task. Detectives must discover new ways to search for evidence without dedicating too many resources to the process.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-ZA&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-ZA&quot;&gt;Wh&lt;/span&gt;at are the basics of computer forensics? What can investigators look for, and where do they look? Find out when the digital forensic experts from &lt;a href=&quot;http://cellularforensics.co.za/&quot;&gt;DLA&lt;/a&gt; discuss the steps in collecting evidence from a computer? &lt;/div&gt;&lt;br /&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://dla-digitalforensics.blogspot.com/feeds/8990410485962300868/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://dla-digitalforensics.blogspot.com/2016/06/computer-forensics-basics-how-it-works.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8093875796213061342/posts/default/8990410485962300868'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8093875796213061342/posts/default/8990410485962300868'/><link rel='alternate' type='text/html' href='http://dla-digitalforensics.blogspot.com/2016/06/computer-forensics-basics-how-it-works.html' title='Computer Forensics Basics – How it works'/><author><name>Christine Romans</name><uri>https://plus.google.com/105596798670349217388</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//lh6.googleusercontent.com/-Nf4Jeogi-rg/AAAAAAAAAAI/AAAAAAAAFaQ/B5KkrDcY2m8/s512-c/photo.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://3.bp.blogspot.com/-Puq0zumduAE/V2FQ0GLJ3cI/AAAAAAAAIek/2i4Qaah4R6QIxchBvF0S4REYjT7z9aRBQCLcB/s72-c/Cyberspace.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8093875796213061342.post-8520075875499091074</id><published>2016-06-08T14:41:00.002+02:00</published><updated>2016-06-08T14:41:45.572+02:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="data recovery"/><category scheme="http://www.blogger.com/atom/ns#" term="data security"/><category scheme="http://www.blogger.com/atom/ns#" term="DLA"/><category scheme="http://www.blogger.com/atom/ns#" term="DLA Cape Town"/><category scheme="http://www.blogger.com/atom/ns#" term="DLA data recovery"/><category scheme="http://www.blogger.com/atom/ns#" term="DLA Digital Forensics"/><category scheme="http://www.blogger.com/atom/ns#" term="How to protect your PC data"/><category scheme="http://www.blogger.com/atom/ns#" term="how to protect your private data"/><category scheme="http://www.blogger.com/atom/ns#" term="ways to protect your PC data"/><title type='text'>Four ways to protect your PC data</title><content type='html'>&lt;div class=&quot;MsoNormal&quot;&gt;A modern PC leads a kind of dual life. On the one hand, it serves as an entertainment centre, offering access to games, online videos, and the entire Internet. On the other hand, it acts as a tool for collecting, creating, and storing important information of all kinds.&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-ZA&quot;&gt;If your computer is lost, broken, or stolen, switching to a new one has little effect on the entertainment side. But unless you&#39;ve properly protected the personal data on that system, a theft or loss could become a data disaster.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-ZA&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-ZA&quot;&gt;The digital forensic experts at &lt;a href=&quot;http://cellularforensics.co.za/&quot;&gt;DLA&lt;/a&gt; use state-of-the-art techniques and software to recover your precious data, whether it was accidentally deleted or even stolen. &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-ZA&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-ZA&quot;&gt;But, how can you head off such a disaster? Here are some hot ideas:&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-ZA&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://2.bp.blogspot.com/-IW29uBIZbho/V1gSEnYt5CI/AAAAAAAAIVA/5DA0CpRDvcgJI_XuZMgSzlPMaDo-akS_wCLcB/s1600/lock_down_data.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;265&quot; src=&quot;https://2.bp.blogspot.com/-IW29uBIZbho/V1gSEnYt5CI/AAAAAAAAIVA/5DA0CpRDvcgJI_XuZMgSzlPMaDo-akS_wCLcB/s400/lock_down_data.jpg&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-ZA&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;b&gt;&lt;span lang=&quot;EN-ZA&quot;&gt;1. Hide Your Valuables&lt;/span&gt;&lt;/b&gt;&lt;span lang=&quot;EN-ZA&quot;&gt;&lt;br /&gt;If a burglar breaks into your house, will she find your valuables lying around in plain sight? Or have you hidden them away safely? By the same token, even though your&amp;nbsp;security suite&amp;nbsp;or&amp;nbsp;antivirus&amp;nbsp;really should fend off data-stealing Trojans, protecting your personal data on the chance one might get through is just common sense. Having your data locked down will also help if that burglar makes off with your laptop.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-ZA&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-owZsEgRG-4I/V1gSKqfTnmI/AAAAAAAAIVI/EJdqIedLqVsr9bik5Kxq3o6QLoDcvYVXwCLcB/s1600/suncoast_casino_recycle_bin.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;266&quot; src=&quot;https://1.bp.blogspot.com/-owZsEgRG-4I/V1gSKqfTnmI/AAAAAAAAIVI/EJdqIedLqVsr9bik5Kxq3o6QLoDcvYVXwCLcB/s400/suncoast_casino_recycle_bin.jpg&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-ZA&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;b&gt;&lt;span lang=&quot;EN-ZA&quot;&gt;2. Skip the Recycle Bin&lt;/span&gt;&lt;/b&gt;&lt;span lang=&quot;EN-ZA&quot;&gt;&lt;br /&gt;When you need to dispose of papers that contain private information, you don&#39;t toss them in the recycling bin with the newspapers. Rather, you put them through the shredder. When deleting sensitive files, you should likewise avoid Windows&#39;s Recycle Bin.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-ZA&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://3.bp.blogspot.com/-8Fr1Lk9HO6c/V1gSO-CXv5I/AAAAAAAAIVQ/XmXq3FGPI-A6xRsMv1vtRKN9598WQz6pgCLcB/s1600/Figure4.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;300&quot; src=&quot;https://3.bp.blogspot.com/-8Fr1Lk9HO6c/V1gSO-CXv5I/AAAAAAAAIVQ/XmXq3FGPI-A6xRsMv1vtRKN9598WQz6pgCLcB/s400/Figure4.jpg&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-ZA&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;b&gt;&lt;span lang=&quot;EN-ZA&quot;&gt;3. Encrypt It!&lt;/span&gt;&lt;/b&gt;&lt;span lang=&quot;EN-ZA&quot;&gt;&lt;br /&gt;A data-stealing Trojan will grab what it can get easily. Unless you&#39;re the target of a personally directed hack attack, you can figure that even simple encryption will defeat the Trojan. Got a sensitive file you need to keep, rather than shred? At the very least, copy it into an encrypted ZIP file and then shred the original.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-ZA&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://2.bp.blogspot.com/-17fm0VQMY38/V1gSTZJ_a7I/AAAAAAAAIVY/adbNQgG6odgUq51pBkkIu6sLEDOSrJXywCLcB/s1600/sharpturn-474x215.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;181&quot; src=&quot;https://2.bp.blogspot.com/-17fm0VQMY38/V1gSTZJ_a7I/AAAAAAAAIVY/adbNQgG6odgUq51pBkkIu6sLEDOSrJXywCLcB/s400/sharpturn-474x215.jpg&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-ZA&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;b&gt;&lt;span lang=&quot;EN-ZA&quot;&gt;4. Keep It Offsite&lt;/span&gt;&lt;/b&gt;&lt;span lang=&quot;EN-ZA&quot;&gt;&lt;br /&gt;PCs break down, laptops get stolen, files get lost. A backup copy is the ultimate security for your data, but if you keep the backup with the computer a single disaster can take out both at once. A hosted&amp;nbsp;online backup&amp;nbsp;service encrypts your data and keeps it in a safe location far, far away.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-ZA&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-ZA&quot;&gt;Unless your PC functions as nothing but an entertainment centre, its loss or theft will have an impact far beyond the cost of a replacement. By taking steps to protect the important data on the PC you can keep that impact to a minimum. &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-ZA&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-ZA&quot;&gt;Hide personal data, securely delete outdated sensitive files, and encrypt sensitive files that you&#39;re still using. That will keep a thief from stealing both your PC and your identity. Maintaining an offsite backup copy will ensure you don&#39;t lose access to the data files you really need to keep. A little effort now can save a huge headache later.&lt;/span&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://dla-digitalforensics.blogspot.com/feeds/8520075875499091074/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://dla-digitalforensics.blogspot.com/2016/06/four-ways-to-protect-your-pc-data.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8093875796213061342/posts/default/8520075875499091074'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8093875796213061342/posts/default/8520075875499091074'/><link rel='alternate' type='text/html' href='http://dla-digitalforensics.blogspot.com/2016/06/four-ways-to-protect-your-pc-data.html' title='Four ways to protect your PC data'/><author><name>Christine Romans</name><uri>https://plus.google.com/105596798670349217388</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//lh6.googleusercontent.com/-Nf4Jeogi-rg/AAAAAAAAAAI/AAAAAAAAFaQ/B5KkrDcY2m8/s512-c/photo.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://2.bp.blogspot.com/-IW29uBIZbho/V1gSEnYt5CI/AAAAAAAAIVA/5DA0CpRDvcgJI_XuZMgSzlPMaDo-akS_wCLcB/s72-c/lock_down_data.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8093875796213061342.post-6800632739891801782</id><published>2016-06-01T15:02:00.002+02:00</published><updated>2016-06-01T15:05:48.522+02:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="data recovery"/><category scheme="http://www.blogger.com/atom/ns#" term="data security"/><category scheme="http://www.blogger.com/atom/ns#" term="DLA"/><category scheme="http://www.blogger.com/atom/ns#" term="DLA Cape Town"/><category scheme="http://www.blogger.com/atom/ns#" term="DLA data recovery"/><category scheme="http://www.blogger.com/atom/ns#" term="DLA Digital Forensics"/><category scheme="http://www.blogger.com/atom/ns#" term="Forensic Data Recovery"/><category scheme="http://www.blogger.com/atom/ns#" term="how to protect data on your phone"/><category scheme="http://www.blogger.com/atom/ns#" term="how to protect your private data"/><title type='text'>How to protect the private data on your phone</title><content type='html'>&lt;div class=&quot;MsoNormal&quot;&gt;Your mobile phone carries all sorts of details that could damage you in the wrong hands. Here&#39;s how you can protect it from prying eyes.&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://2.bp.blogspot.com/-6EneooL6reA/V07cs85sCCI/AAAAAAAAIH4/errTxRNx5J0ZhC7RbrLISFsh_nnDwt7xgCLcB/s1600/canstockphoto15927760.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;426&quot; src=&quot;https://2.bp.blogspot.com/-6EneooL6reA/V07cs85sCCI/AAAAAAAAIH4/errTxRNx5J0ZhC7RbrLISFsh_nnDwt7xgCLcB/s640/canstockphoto15927760.jpg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;b&gt;&lt;span lang=&quot;EN-ZA&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;/div&gt;&lt;ul&gt;&lt;li&gt;&lt;b&gt;&lt;span lang=&quot;EN-ZA&quot;&gt;Register your IMEI number&lt;/span&gt;&lt;/b&gt;&lt;/li&gt;&lt;/ul&gt;&lt;br /&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-ZA&quot;&gt;The&amp;nbsp;&lt;a href=&quot;http://www.webopedia.com/TERM/I/IMEI.html&quot;&gt;International Mobile Equipment Identity&lt;/a&gt;&amp;nbsp;is used by police to trace a lost phone. Network providers use it to block a stolen phone. It&#39;s usually found under the battery, or via the phone&#39;s settings. Register it at a site such as&lt;a href=&quot;https://www.immobilise.com/&quot;&gt;&amp;nbsp;immobilise.com.&lt;/a&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-ZA&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;/div&gt;&lt;ul&gt;&lt;li&gt;&lt;b&gt;&lt;span lang=&quot;EN-ZA&quot;&gt;Remotely wipe all data&lt;/span&gt;&lt;/b&gt;&lt;/li&gt;&lt;/ul&gt;&lt;br /&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-ZA&quot;&gt;If you have lost your phone, you can clear the data before thieves download it. Android devices can use&amp;nbsp;&lt;a href=&quot;https://www.google.com/sync/&quot;&gt;Google Sync&lt;/a&gt;&amp;nbsp;along with Google Apps Device Policy to clear data remotely. Have you cleared your data and you want to get it back? Contact the digital experts at &lt;a href=&quot;http://cellularforensics.co.za/&quot;&gt;DLA&lt;/a&gt; and you can get your precious data back quickly and easily!&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-ZA&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;/div&gt;&lt;ul&gt;&lt;li&gt;&lt;b&gt;&lt;span lang=&quot;EN-ZA&quot;&gt;Get antivirus protection&lt;/span&gt;&lt;/b&gt;&lt;/li&gt;&lt;/ul&gt;&lt;br /&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-ZA&quot;&gt;Now is the time to protect against malware and viruses, particularly on&amp;nbsp;Android&amp;nbsp;phones. There are subtle ways for developers and fraudsters to get to your data. Most computer antivirus-software companies provide apps to keep out malware and viruses that grab data.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-ZA&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;/div&gt;&lt;ul&gt;&lt;li&gt;&lt;b&gt;&lt;span lang=&quot;EN-ZA&quot;&gt;Download a phone-Finder app&lt;/span&gt;&lt;/b&gt;&lt;/li&gt;&lt;/ul&gt;&lt;br /&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-ZA&quot;&gt;Most smartphones now have GPS tracking -- which you can use to locate a lost phone. Apple&#39;s&lt;a href=&quot;https://itunes.apple.com/za/app/find-my-iphone/id376101648?mt=8&quot;&gt;&amp;nbsp;Find My iPhone&lt;/a&gt;&amp;nbsp;app has been free since the introduction of iOS 4.2. Android users should try&amp;nbsp;Theft Aware.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;br /&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://dla-digitalforensics.blogspot.com/feeds/6800632739891801782/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://dla-digitalforensics.blogspot.com/2016/06/how-to-protect-private-data-on-your.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8093875796213061342/posts/default/6800632739891801782'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8093875796213061342/posts/default/6800632739891801782'/><link rel='alternate' type='text/html' href='http://dla-digitalforensics.blogspot.com/2016/06/how-to-protect-private-data-on-your.html' title='How to protect the private data on your phone'/><author><name>Christine Romans</name><uri>https://plus.google.com/105596798670349217388</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//lh6.googleusercontent.com/-Nf4Jeogi-rg/AAAAAAAAAAI/AAAAAAAAFaQ/B5KkrDcY2m8/s512-c/photo.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://2.bp.blogspot.com/-6EneooL6reA/V07cs85sCCI/AAAAAAAAIH4/errTxRNx5J0ZhC7RbrLISFsh_nnDwt7xgCLcB/s72-c/canstockphoto15927760.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8093875796213061342.post-6287004931174702318</id><published>2016-05-25T14:15:00.001+02:00</published><updated>2016-05-25T14:15:45.258+02:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="common cyber attacks"/><category scheme="http://www.blogger.com/atom/ns#" term="cyber attacks"/><category scheme="http://www.blogger.com/atom/ns#" term="cyber crime"/><category scheme="http://www.blogger.com/atom/ns#" term="cyber criminal"/><category scheme="http://www.blogger.com/atom/ns#" term="cyber criminals"/><category scheme="http://www.blogger.com/atom/ns#" term="DLA"/><category scheme="http://www.blogger.com/atom/ns#" term="DLA Cape Town"/><category scheme="http://www.blogger.com/atom/ns#" term="DLA Cellular Forensics"/><category scheme="http://www.blogger.com/atom/ns#" term="DLA cyber crime"/><category scheme="http://www.blogger.com/atom/ns#" term="DLA Digital Forensics"/><title type='text'>The 5 cyber-attacks you&#39;re most likely to face</title><content type='html'>&lt;div class=&quot;MsoNormal&quot;&gt;The fact is most companies face the same threats and should be doing their utmost to counteract those risks. However at some point you may lose your precious data to a vicious cyber-attack, if you’re ever in this position, contact the experts at &lt;a href=&quot;http://cellularforensics.co.za/&quot;&gt;DLA&lt;/a&gt; for assistance!&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://4.bp.blogspot.com/-hHg5uWoIVVE/V0WWsLGOduI/AAAAAAAAIA8/sk8PyS1YgsIQbOWOZwRmvvcxWnQIwpazwCLcB/s1600/cyber-attack-data-breach.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;426&quot; src=&quot;https://4.bp.blogspot.com/-hHg5uWoIVVE/V0WWsLGOduI/AAAAAAAAIA8/sk8PyS1YgsIQbOWOZwRmvvcxWnQIwpazwCLcB/s640/cyber-attack-data-breach.jpg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-ZA&quot;&gt;Here are the five most common successful cyber-attacks.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-ZA&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;b&gt;&lt;span lang=&quot;EN-ZA&quot;&gt;&lt;span style=&quot;color: #073763;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;Cyber-attack No. 1: Socially engineered Trojans&lt;/span&gt;&lt;/span&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;b&gt;&lt;span lang=&quot;EN-ZA&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-ZA&quot;&gt;This is the No. 1 method of attack. Usually, a website will tell users they are infected by viruses and need to run fake antivirus software. Also, they&#39;re nearly out of free disk space and need a fake disk defragger. Finally, they must install an otherwise unnecessary program, often a fake Adobe Reader or an equally well-known program. The user&amp;nbsp;executes the malware, clicking past browser warnings that the program could possibly be harmful. Voilà, exploit accomplished! &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-ZA&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;b&gt;&lt;span lang=&quot;EN-ZA&quot;&gt;&lt;span style=&quot;color: #073763; font-size: large;&quot;&gt;Cyber-attack No. 2: Unpatched software&lt;/span&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;b&gt;&lt;span lang=&quot;EN-ZA&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-ZA&quot;&gt;Coming in a distant second is software with known, but unpatched exploits. The most common unpatched and exploited programs are&amp;nbsp;Java,&amp;nbsp;Adobe Reader, and Adobe Flash. &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-ZA&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-ZA&quot;&gt;The best countermeasure is to stop what you’re doing right now and make sure your patching is perfect!&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-ZA&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;a href=&quot;https://2.bp.blogspot.com/-G4GUn6Ukm2E/V0WW7K6WvWI/AAAAAAAAIBA/o82a3EKeD18n44DYcfwiseRL4XUErqWmwCLcB/s1600/o-BANK-CYBER-ATTACK-facebook.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;266&quot; src=&quot;https://2.bp.blogspot.com/-G4GUn6Ukm2E/V0WW7K6WvWI/AAAAAAAAIBA/o82a3EKeD18n44DYcfwiseRL4XUErqWmwCLcB/s400/o-BANK-CYBER-ATTACK-facebook.jpg&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;b&gt;&lt;span lang=&quot;EN-ZA&quot;&gt;&lt;span style=&quot;color: #073763; font-size: large;&quot;&gt;Cyber-attack No. 3: Phishing attacks&lt;/span&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;b&gt;&lt;span lang=&quot;EN-ZA&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-ZA&quot;&gt;About 70% of emails are spam. Even though there are anti-spam vendors, you will probably receive several spam emails each day, and a least a few of them each week are darned good phishing replicas of legitimate emails.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-ZA&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;b&gt;&lt;span lang=&quot;EN-ZA&quot;&gt;&lt;span style=&quot;color: #073763; font-size: large;&quot;&gt;Cyber-attack No. 4: Network-traveling worms&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;b&gt;&lt;span lang=&quot;EN-ZA&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-ZA&quot;&gt;Computer viruses aren&#39;t much of a threat anymore, but their network-traveling worm cousins are. We don&#39;t see the massive outbreaks of the past with email attachment worms, but the network-traveling variety is able to hide far better than its email relatives.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-ZA&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;b&gt;&lt;span lang=&quot;EN-ZA&quot;&gt;&lt;span style=&quot;color: #073763; font-size: large;&quot;&gt;Cyber-attack No. 5: Advanced persistent threats&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;b&gt;&lt;span lang=&quot;EN-ZA&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-ZA&quot;&gt;APTs usually gain a foothold using socially engineered Trojans or phishing attacks.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-ZA&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-ZA&quot;&gt;A very popular method is for APT attackers to send a very specific phishing campaign -- known as spearphishing -- to multiple employee email addresses. The phishing email contains a Trojan attachment, which at least one employee is tricked into running. After the initial execution and first computer takeover, APT attackers can compromise an entire enterprise in a matter of hours. It&#39;s easy to accomplish, but a royal pain to clean up.&lt;/span&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://dla-digitalforensics.blogspot.com/feeds/6287004931174702318/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://dla-digitalforensics.blogspot.com/2016/05/the-5-cyber-attacks-youre-most-likely.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8093875796213061342/posts/default/6287004931174702318'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8093875796213061342/posts/default/6287004931174702318'/><link rel='alternate' type='text/html' href='http://dla-digitalforensics.blogspot.com/2016/05/the-5-cyber-attacks-youre-most-likely.html' title='The 5 cyber-attacks you&#39;re most likely to face'/><author><name>Christine Romans</name><uri>https://plus.google.com/105596798670349217388</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//lh6.googleusercontent.com/-Nf4Jeogi-rg/AAAAAAAAAAI/AAAAAAAAFaQ/B5KkrDcY2m8/s512-c/photo.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://4.bp.blogspot.com/-hHg5uWoIVVE/V0WWsLGOduI/AAAAAAAAIA8/sk8PyS1YgsIQbOWOZwRmvvcxWnQIwpazwCLcB/s72-c/cyber-attack-data-breach.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8093875796213061342.post-6283825534837423115</id><published>2016-05-18T11:00:00.001+02:00</published><updated>2016-05-18T11:00:17.575+02:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="data recovery"/><category scheme="http://www.blogger.com/atom/ns#" term="digital forensic analysis"/><category scheme="http://www.blogger.com/atom/ns#" term="digital forensics"/><category scheme="http://www.blogger.com/atom/ns#" term="DLA"/><category scheme="http://www.blogger.com/atom/ns#" term="DLA Cape Town"/><category scheme="http://www.blogger.com/atom/ns#" term="DLA Cellular Forensics"/><category scheme="http://www.blogger.com/atom/ns#" term="DLA Digital Forensics"/><category scheme="http://www.blogger.com/atom/ns#" term="DLA mobile forensics"/><category scheme="http://www.blogger.com/atom/ns#" term="DLA SMS recovery"/><category scheme="http://www.blogger.com/atom/ns#" term="recover WhatsApp history"/><title type='text'>Never forget the victim (and their device)!</title><content type='html'>&lt;div class=&quot;MsoNormal&quot;&gt;Regardless if your case involves computers, tablets, iPhones, Android devices or all of the above, one thing the investigative community can agree on is, every case is different.&amp;nbsp;&amp;nbsp;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-p15SY-M0oSw/VzwuHNk5UcI/AAAAAAAAH5I/OfyCd9vugZU0U9nQqkNmahVR7EgDQqPcQCLcB/s1600/victim_cellphone.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;225&quot; src=&quot;https://1.bp.blogspot.com/-p15SY-M0oSw/VzwuHNk5UcI/AAAAAAAAH5I/OfyCd9vugZU0U9nQqkNmahVR7EgDQqPcQCLcB/s400/victim_cellphone.jpg&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;Sure, certain cases will follow a workflow pattern, but the circumstances of every case, the suspects/targets, investigators and victims all take on different faces, which can alter your approach to conducting digital forensic analysis in the case slightly or dramatically.&amp;nbsp;&amp;nbsp;We’ve all seen a surge in criminal (and civil) cases involving smart phones and other mobile devices and with that comes the mountain of evidence that is contained on a those powerful pocket computers that can store up to 128 GB of data (or more).&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-ZA&quot;&gt;But consider this: You may only be getting half of the story if the only device you seize and analyze is that belonging to the target of your investigation.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-ZA&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-ZA&quot;&gt;The digital forensic experts at &lt;a href=&quot;http://cellularforensics.co.za/&quot;&gt;DLA&lt;/a&gt;encourage anyone who needs &lt;a href=&quot;http://cellularforensics.co.za/9-services/18-data-recovery&quot;&gt;data&lt;/a&gt;, &lt;a href=&quot;http://cellularforensics.co.za/9-services/19-sms-recovery&quot;&gt;SMS&lt;/a&gt;, &lt;a href=&quot;http://cellularforensics.co.za/2-uncategorised/22-recovery-of-whatsapp-history-2&quot;&gt;WhatsApp&lt;/a&gt;, &lt;a href=&quot;http://cellularforensics.co.za/9-services/20-password-recovery&quot;&gt;password recovery&lt;/a&gt;, and so much more, to contact them today! &amp;nbsp;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-ZA&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;/div&gt;&lt;ul&gt;&lt;li&gt;&lt;b&gt;&lt;span lang=&quot;EN-ZA&quot;&gt;Case Application&amp;nbsp;&lt;/span&gt;&lt;/b&gt;&lt;/li&gt;&lt;/ul&gt;&lt;br /&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-ZA&quot;&gt;The best case example we can use to illustrate this point is the investigation of a rape allegation.&amp;nbsp;&amp;nbsp;Rape doesn’t happen in a bubble, it takes two people (or more) for a rape to occur.&amp;nbsp;&amp;nbsp;And virtually everyone involved in these incidents owns &amp;amp; uses a smart phone on a daily basis.&amp;nbsp;&amp;nbsp;Frequently, rape occurs when the alleged perpetrator knows the victim, either in some sort of early-stage relationship, a family friend, relative, etc.&amp;nbsp;&amp;nbsp;Because experienced investigators know this to be true and many reports will validate this, it is your investigative responsibility to prove or disprove the claim.&amp;nbsp;&amp;nbsp;In order to help do that, you need to seize not only the target’s phone data, but also the alleged victim’s phone data – all as soon as possible.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-ZA&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-ZA&quot;&gt;The best (and sometimes worst) thing about mobile device forensics is, once the data is extracted, it belongs to the digital forensic examiners.&amp;nbsp;It is a digital snapshot of whatever was present on the device at the time the extraction took place and, depending on the device, may also give us access to deleted information.&amp;nbsp;&amp;nbsp;So in the interest of conducting a thorough investigation, I put forth that when an alleged rape victim makes the report, investigators should make it a regular and common practice to ask for consent to perform a data extraction on his/her phone.&amp;nbsp;&amp;nbsp;It is simply the easiest way to get a 360-degree view of the case.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-ZA&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;/div&gt;&lt;ul&gt;&lt;li&gt;&lt;b&gt;A More Holistic View of the Data&lt;/b&gt;&lt;/li&gt;&lt;/ul&gt;&lt;br /&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-ZA&quot;&gt;Consider also what happens in the mind of the target after they know they may have committed a crime.&amp;nbsp;&amp;nbsp;Text and chat messages are deleted.&amp;nbsp;&amp;nbsp;Pictures of the alleged victim get erased from the device.&amp;nbsp;&amp;nbsp;They may even dispose of the device altogether and replace it with a new, fresh phone that has virtually no useful evidence contained on it.&amp;nbsp;&amp;nbsp;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-ZA&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-ZA&quot;&gt;Wouldn’t it be nice if the other side of those conversations still existed on another device?&amp;nbsp;&amp;nbsp;What’s more, by grabbing the data from the alleged victim’s phone, you work toward a more complete investigation of the allegation.&amp;nbsp;&amp;nbsp;It is an unfortunate reality that there are often false reports of serious crimes.&amp;nbsp;&amp;nbsp;This certainly doesn’t mean that we automatically assume the victim may be lying, but it is our responsibility to fully investigate the case to determine what actually happened.&amp;nbsp;&amp;nbsp;Victims and eye witnesses are notoriously unreliable for different reasons.&amp;nbsp;&amp;nbsp;When victims are subjected to trauma, their accurate recollection of the incident can suffer to a degree, so that puts even more oneness on the investigator to try and piece the puzzle together.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-ZA&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-ZA&quot;&gt;The best part about the data is it doesn’t lie.&amp;nbsp;&amp;nbsp;It has a perfect memory and it’s all documented, complete with date and time stamps, GPS coordinates, network activity and other great pieces of evidence that are very hard to spoof or fake, if not nearly impossible for most mobile device users.&amp;nbsp;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-ZA&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-m9hKrTgaozk/VzwuXtI6imI/AAAAAAAAH5M/aFLjm3RPyJkAvjvAEoSOccQYp5TdKq5ugCLcB/s1600/CD-USB_1.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;424&quot; src=&quot;https://1.bp.blogspot.com/-m9hKrTgaozk/VzwuXtI6imI/AAAAAAAAH5M/aFLjm3RPyJkAvjvAEoSOccQYp5TdKq5ugCLcB/s640/CD-USB_1.jpg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-ZA&quot;&gt;Never forget there is always more than one person involved in the investigation.&amp;nbsp;Grabbing the alleged victim’s cell phone data in this circumstance could mean the difference between an innocent person being convicted of a serious crime or being exonerated fully.&amp;nbsp;&amp;nbsp;When all the facts have been completely uncovered, the truth must remain and will have to hold up in a court of law.&amp;nbsp;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://dla-digitalforensics.blogspot.com/feeds/6283825534837423115/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://dla-digitalforensics.blogspot.com/2016/05/never-forget-victim-and-their-device.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8093875796213061342/posts/default/6283825534837423115'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8093875796213061342/posts/default/6283825534837423115'/><link rel='alternate' type='text/html' href='http://dla-digitalforensics.blogspot.com/2016/05/never-forget-victim-and-their-device.html' title='Never forget the victim (and their device)!'/><author><name>Christine Romans</name><uri>https://plus.google.com/105596798670349217388</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//lh6.googleusercontent.com/-Nf4Jeogi-rg/AAAAAAAAAAI/AAAAAAAAFaQ/B5KkrDcY2m8/s512-c/photo.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://1.bp.blogspot.com/-p15SY-M0oSw/VzwuHNk5UcI/AAAAAAAAH5I/OfyCd9vugZU0U9nQqkNmahVR7EgDQqPcQCLcB/s72-c/victim_cellphone.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8093875796213061342.post-8479542098961654221</id><published>2016-05-11T11:17:00.001+02:00</published><updated>2016-05-11T11:17:35.690+02:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="cellular forensics"/><category scheme="http://www.blogger.com/atom/ns#" term="data recovery"/><category scheme="http://www.blogger.com/atom/ns#" term="DLA"/><category scheme="http://www.blogger.com/atom/ns#" term="DLA Cape Town"/><category scheme="http://www.blogger.com/atom/ns#" term="DLA Cellular Forensics"/><category scheme="http://www.blogger.com/atom/ns#" term="DLA data recovery"/><category scheme="http://www.blogger.com/atom/ns#" term="DLA Forensic data recovery"/><category scheme="http://www.blogger.com/atom/ns#" term="DLA mobile forensics"/><category scheme="http://www.blogger.com/atom/ns#" term="Mobile Attack"/><category scheme="http://www.blogger.com/atom/ns#" term="mobile forensics"/><category scheme="http://www.blogger.com/atom/ns#" term="what is a mobile attack"/><title type='text'>The Anatomy of a Mobile Attack</title><content type='html'>&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-ZA&quot;&gt;A mobile attack can involve the device layer, the network layer, the data centre, or a combination of these. Inherent platform vulnerabilities and social engineering continue to pose major opportunities for cyber thieves and thus significant challenges for those looking protect user data.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-ZA&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://3.bp.blogspot.com/-QK6kHOJ3Jhw/VzL3x_bC_II/AAAAAAAAHww/MPP3GWUdNwIOiELk-ws73IZNwZpDXCDvwCLcB/s1600/lego-cybercriminal_3154758b.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;392&quot; src=&quot;https://3.bp.blogspot.com/-QK6kHOJ3Jhw/VzL3x_bC_II/AAAAAAAAHww/MPP3GWUdNwIOiELk-ws73IZNwZpDXCDvwCLcB/s640/lego-cybercriminal_3154758b.jpg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-ZA&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-ZA&quot;&gt;If you’ve been the victim of a mobile attack, don’t hesitate – contact the digital forensic experts at &lt;a href=&quot;http://cellularforensics.co.za/&quot;&gt;DLA&lt;/a&gt; and we can help you &lt;a href=&quot;http://cellularforensics.co.za/9-services/18-data-recovery&quot;&gt;recover your precious cellular data&lt;/a&gt; quickly and effectively.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-ZA&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-ZA&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;ATTACK SURFACE: DEVICE&lt;/span&gt;&lt;/b&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-ZA&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-ZA&quot;&gt;&lt;u&gt;&lt;span style=&quot;color: #93c47d;&quot;&gt;Browser&lt;/span&gt;&lt;/u&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-ZA&quot;&gt;- Phishing&lt;br /&gt;- Framing&lt;br /&gt;- Clickjacking&lt;br /&gt;- Man-in-the-middle&lt;br /&gt;- Buffer Overflow&lt;br /&gt;- Data Caching&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-ZA&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-ZA&quot;&gt;&lt;u&gt;&lt;span style=&quot;color: #93c47d;&quot;&gt;System&lt;/span&gt;&lt;/u&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-ZA&quot;&gt;- No Passcode / Weak Passcode&lt;br /&gt;- iOS Jailbreaking&lt;br /&gt;- Android Rooting&lt;br /&gt;- OS Data Caching&lt;br /&gt;- Passwords &amp;amp; Data Accessible&lt;br /&gt;- Carrier-Loaded Software&lt;br /&gt;- No Encryption / Weak Encryption&lt;br /&gt;- User-Initiated Code&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-ZA&quot;&gt;&lt;span style=&quot;color: #0c343d;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-ZA&quot;&gt;&lt;u&gt;&lt;span style=&quot;color: #93c47d;&quot;&gt;Phone / SMS&lt;/span&gt;&lt;/u&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-ZA&quot;&gt;- Baseband Attacks&lt;br /&gt;- SMishing&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-ZA&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-ZA&quot;&gt;&lt;u&gt;&lt;span style=&quot;color: #93c47d;&quot;&gt;Apps&lt;/span&gt;&lt;/u&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-ZA&quot;&gt;- Sensitive Data Storage&lt;br /&gt;- No Encryption / Weak Encryption&lt;br /&gt;- Improper SSL Validation&lt;br /&gt;- Config Manipulation&lt;br /&gt;- Dynamic Runtime Injection&lt;br /&gt;- Unintended Permissions&lt;br /&gt;- Escalated Privileges&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-ZA&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-ZA&quot;&gt;&lt;u&gt;&lt;span style=&quot;color: #93c47d;&quot;&gt;Malware&lt;/span&gt;&lt;/u&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-ZA&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-ZA&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;ATTACK SURFACE: NETWORK&lt;/span&gt;&lt;/b&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-ZA&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-ZA&quot;&gt;- Wi-Fi (No Encryption / Weak Encryption)&lt;br /&gt;- Rogue Access Point&lt;br /&gt;- Packet Sniffing&lt;br /&gt;- Man-In-The-Middle (MITM)&lt;br /&gt;- Session Hijacking&lt;br /&gt;- DNS Poisoning&lt;br /&gt;- SSL Strip&lt;br /&gt;- Fake SSL Certificate&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-ZA&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-ZA&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;ATTACK SURFACE: DATA CENTRE&lt;/span&gt;&lt;/b&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-ZA&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-ZA&quot;&gt;&lt;u&gt;&lt;span style=&quot;color: #93c47d;&quot;&gt;Web Server&lt;/span&gt;&lt;/u&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-ZA&quot;&gt;- Platform Vulnerabilities&lt;br /&gt;- Server Misconfiguration&lt;br /&gt;- Cross-site Scripting (XSS)&lt;br /&gt;- Cross-Site Request Forgery (CSRF)&lt;br /&gt;- Weak Input Validation&lt;br /&gt;- Brute Force Attacks&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-ZA&quot;&gt;&lt;u&gt;&lt;br /&gt;&lt;/u&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-ZA&quot;&gt;&lt;u&gt;&lt;span style=&quot;color: #93c47d;&quot;&gt;Database&lt;/span&gt;&lt;/u&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-ZA&quot;&gt;- SQL Injection&lt;br /&gt;- Privilege Escalation&lt;br /&gt;- Data Dumping&lt;br /&gt;- OS Command Execution&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-ZA&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://dla-digitalforensics.blogspot.com/feeds/8479542098961654221/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://dla-digitalforensics.blogspot.com/2016/05/the-anatomy-of-mobile-attack.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8093875796213061342/posts/default/8479542098961654221'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8093875796213061342/posts/default/8479542098961654221'/><link rel='alternate' type='text/html' href='http://dla-digitalforensics.blogspot.com/2016/05/the-anatomy-of-mobile-attack.html' title='The Anatomy of a Mobile Attack'/><author><name>Christine Romans</name><uri>https://plus.google.com/105596798670349217388</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//lh6.googleusercontent.com/-Nf4Jeogi-rg/AAAAAAAAAAI/AAAAAAAAFaQ/B5KkrDcY2m8/s512-c/photo.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://3.bp.blogspot.com/-QK6kHOJ3Jhw/VzL3x_bC_II/AAAAAAAAHww/MPP3GWUdNwIOiELk-ws73IZNwZpDXCDvwCLcB/s72-c/lego-cybercriminal_3154758b.jpg" height="72" width="72"/><thr:total>0</thr:total></entry></feed>