Wednesday, 21 December 2016
Wednesday, 30 November 2016
Wednesday, 23 November 2016
Wednesday, 26 October 2016
At DLADigital Forensics, we combine the experience of two seasoned investigators with both criminal and civil backgrounds with the latest technologies to achieve the results that you require. From data recovery, recovery of chat history, digital suspect profiling and so much more - contact DLA today!
Wednesday, 12 October 2016
Wednesday, 21 September 2016
Wednesday, 7 September 2016
Take a look at the videos below...
Contact us here for more information... email@example.com or 082 886 8327 / 021 551 6222
Tuesday, 6 September 2016
Thursday, 1 September 2016
Wednesday, 31 August 2016
Wednesday, 24 August 2016
Wednesday, 3 August 2016
Wednesday, 20 July 2016
The digital forensic experts from DLA use their knowledge of investigation and forensic software to find and reveal the computer or mobile forensic evidence that your require.
Thursday, 14 July 2016
Wednesday, 6 July 2016
Wednesday, 29 June 2016
Wednesday, 22 June 2016
Wednesday, 15 June 2016
Wednesday, 8 June 2016
If a burglar breaks into your house, will she find your valuables lying around in plain sight? Or have you hidden them away safely? By the same token, even though your security suite or antivirus really should fend off data-stealing Trojans, protecting your personal data on the chance one might get through is just common sense. Having your data locked down will also help if that burglar makes off with your laptop.
When you need to dispose of papers that contain private information, you don't toss them in the recycling bin with the newspapers. Rather, you put them through the shredder. When deleting sensitive files, you should likewise avoid Windows's Recycle Bin.
A data-stealing Trojan will grab what it can get easily. Unless you're the target of a personally directed hack attack, you can figure that even simple encryption will defeat the Trojan. Got a sensitive file you need to keep, rather than shred? At the very least, copy it into an encrypted ZIP file and then shred the original.
PCs break down, laptops get stolen, files get lost. A backup copy is the ultimate security for your data, but if you keep the backup with the computer a single disaster can take out both at once. A hosted online backup service encrypts your data and keeps it in a safe location far, far away.
Wednesday, 1 June 2016
- Register your IMEI number
- Remotely wipe all data
- Get antivirus protection
- Download a phone-Finder app
Wednesday, 25 May 2016
Wednesday, 18 May 2016
- Case Application
- A More Holistic View of the Data
Wednesday, 11 May 2016
- Buffer Overflow
- Data Caching
- iOS Jailbreaking
- Android Rooting
- OS Data Caching
- Passwords & Data Accessible
- Carrier-Loaded Software
- No Encryption / Weak Encryption
- User-Initiated Code
- No Encryption / Weak Encryption
- Improper SSL Validation
- Config Manipulation
- Dynamic Runtime Injection
- Unintended Permissions
- Escalated Privileges
- Rogue Access Point
- Packet Sniffing
- Man-In-The-Middle (MITM)
- Session Hijacking
- DNS Poisoning
- SSL Strip
- Fake SSL Certificate
- Server Misconfiguration
- Cross-site Scripting (XSS)
- Cross-Site Request Forgery (CSRF)
- Weak Input Validation
- Brute Force Attacks
- Privilege Escalation
- Data Dumping
- OS Command Execution
Wednesday, 4 May 2016
- 50+ years old – 11%
- 35+ years old – 43%
- Under 25 years old – 29%
- 14 - 18 years old – 8%
- Male – 76%
- 25% active cyber criminal groups have operated for 6 months or less
- 50% cyber criminals groups have 6 or more members
- North & South America – 19% of global attack traffic
- Europe – 28% of global attack traffic
- APAC – More than 49% of global attack traffic
- Indonesia – Highest in APAC with 14%
- Full-fledged businesses with execs, middle managers and workers.
- Underground chat rooms, web portals + market places for hiring hackers, buying malware + other illegal information are supporting these “businesses”.
- Invitation-only, help wanted portals specifically for cyber criminals, most originating from Russia.
- Hosting providers are key to success of cybercriminals who need servers to store illegal code, malware + stolen data, most of these providers are in Russia and China.
- If buying merchandise or making a payment online, make sure it is a reputable, secure source.
- Track your online credit transactions often for fraudulent activity
- Shred, don’t throw away any bank or credit card statements
- Be wary of providing credit card information through email.
- Be cautious when dealing with individuals from outside your country.
- Be cautious when money is required up front for any job lead.
- Never provide unknown prospective employers with your social security number.
- Never give your credit card number out over the phone unless you made the call to the known business.
- Never open or respond to spam emails.
Thursday, 28 April 2016
Wednesday, 20 April 2016
Wednesday, 13 April 2016
The revelation comes two days after the US government tentatively withdrew its demands that Apple write code and assist the authorities to unlock a seized iPhone used by one of the San Bernardino County shooters. The FBI told a federal judge that an "outside party demonstrated to the FBI a possible method for unlocking (Syed) Farook's iPhone." A federal magistrate then tentatively stayed her order demanding that Apple assist the authorities in unlocking the phone.
That same day, according to public records, the FBI committed to a $15 278 "action obligation" with Cellebrite. An "action obligation" is the lowest amount the government has agreed to pay. No other details of the contract were available, and the Justice Department declined comment. Cellebrite, however, has reportedly assisted US authorities in accessing an iPhone.
For now, US-based security experts believe that Cellebrite does have the wherewithal to perform the task.
"I'm really not at liberty to confirm the third party, but based on the techniques I've described in my blog on the subject, I think Cellebrite, as well as many large forensics firms like it, have the capability to perform such tasks," forensic scientist Jonathan Zdziarski told Ars in an e-mail. "DriveSavers, for example, has released statements yesterday suggesting they're almost there. I think the techniques are pretty straight forward for firms like these now that the tech community has had a chance to comment."
DLA is based in Cape Town and combines the experience of two seasoned investigators with both criminal and civil backgrounds with the latest technologies to achieve the results that you require - contact DLA today!