Showing posts with label cellular forensics. Show all posts
Showing posts with label cellular forensics. Show all posts

Wednesday, 6 February 2019

All you need to know about Digital Forensics and Information Security


Before we get into the differences between digital forensics and information security, let’s stop and take a look at how they are alike.

Related image

Both digital forensics and information security are aimed at protecting your digital data, goods and valuables as well as digital resources. People who are involved in digital forensics or information security can work in a range of industries, including private businesses and organisations. Why can people in the digital forensics and information security work in so many different industries?  Because, companies know that as the world becomes more digitally dependant so does the need to keep their technology and systems properly secured. Digital forensics and information security specialists are becoming more and more popular as the demand for their skillset grows.

But, just because digital forensics and information security are both focused on digital goods and resources doesn’t mean the two are both closely associated with each other doesn’t mean they are the same.

It is best to think of digital forensics and information security as two different sides of the same thing, so the services and work that is done is very much the same, but it does have differences.

So what is the difference between digital forensics and information security? To put it into simple terms that everyone can understand, information security is about preventing and protecting against online and digital threats. On the other hand digital forensics is about the response that comes after.

Let’s look at it like this – information security is the team that executes and supports the information security system with the aim being to protect individuals and businesses against cyber threats. If information security fails to protect the users and the systems are broken, then this is where the digital forensics experts come into the picture – they will put their skills to use by singling out the threat, understanding it and trying to recover all the data that was lost and/or stolen.


At TCG Digital Forensics, we offer all our clients clean, professional and affordable digital forensics services as well as information security – all supplied by our team of skilled digital forensics experts. Do not hesitate to contact us to discuss your requirements; simply give us a call on 021 110 0422 or email contact@tcgforensics.co.za

Monday, 14 January 2019

What do you know about SMS & Mobile Phone Phishing?


Because there has been a rise of mobile phone messaging services such as WhatsApp and Facebook messenger, cybercriminals now have a new way to attack users!


SMS phishing or SMiShing works in the same way as email phishing – the victim is sent a fake offer or warning that appears to be from a legitimate company or organization. The message usually contains a malicious link that the victim is persuaded into clicking.

A SMiShing message is often short and to the point with the aim of shocking or scaring a user into clicking the link without thinking twice. A common method is when cybercriminals pretend to be from a bank, warning the victim that their account has been closed, disabled or compromised.

Because the fraudulent message is received via SMS or private message, it can be difficult to realise the message is fake. Why? Because these messages do not contain warning signs of a scam such as the senders email address. Without knowing the SMS is fraudulent, the victim will click on the link willingly and hand over their private information and/or passwords to the cyber attackers.

Here are some helpful tips on preventing SMiShing:

1. Do not click on unknown SMSs or private messages hat contain links!
2. Never reply or give out your personal information if you receive an SMS asking you to
3. If the SMS asks for a quick/urgent reply this is a sign of SMiShing
4. An SMS states “Congratulations, you have won”, etc. this is another sign of SMiShing
5. Should you receive an SMS from your bank, always call your banks customer service line first to double check that it is legitimate

Trust your instincts – if the SMS doesn’t seem right, do not click on it!

TCG Forensics offers a range of cellular and digital forensics services. Should you need the assistance of an expert forensic investigator please do not hesitate to give us a call on 021 110 0422 or email contact@tcgforensics.co.za

Thursday, 13 December 2018

What is the Difference Between Digital Forensics and Information Security


Before we get into the differences between digital forensics and information security, let’s stop and take a look at how they are alike.

Image result for digital forensics

Both digital forensics and information security are aimed at protecting your digital data, goods and valuables as well as digital resources. People who are involved in digital forensics or information security can work in a range of industries, including private businesses and organisations. Why can people in the digital forensics and information security work in so many different industries? Because, companies know that as the world becomes more digitally dependant so does the need to keep their technology and systems properly secured. Digital forensics and information security specialists are becoming more and more popular as the demand for their skillset grows.

But, just because digital forensics and information security are both focused on digital goods and resources doesn’t mean the two are both closely associated with each other doesn’t mean they are the same.

It is best to think of digital forensics and information security as two different sides of the same thing, so the services and work that is done is very much the same, but it does have differences.

So what is the difference between digital forensics and information security? To put it into simple terms that everyone can understand, information security is about preventing and protecting against online and digital threats. On the other hand digital forensics is about the response that comes after.

Related image

Let’s look at it like this – information security is the team that executes and supports the information security system with the aim being to protect individuals and businesses against cyber threats. If information security fails to protect the users and the systems are broken, then this is where the digital forensics experts come into the picture – they will put their skills to use by singling out the threat, understanding it and trying to recover all the data that was lost and/or stolen.

At TCG Digital Forensics, we offer all our clients clean, professional and affordable digital forensics services as well as information security – all supplied by our team of skilled digital forensics experts. Do not hesitate to contact us to discuss your requirements; simply give us a call on 021 110 0422 or email contact@tcgforensics.co.za

Tuesday, 11 December 2018

3 Reasons why you should always update WhatsApp


In this digital age, time is important, so most people want to satisfy most of their needs in just one click… More and more messengers are becoming popular, but WhatsApp still remains especially popular, which is why hackers keep their sights on it.

Image result for whatsapp

Here are some of the vulnerabilities in the WhatsApp application…

> Did you know that it is possible to gain access to an individual’s messages because of vulnerability in the WhatsApp protocol?

> Hackers can a gain access to a user’s cell phone by using a vulnerability that is triggered when a video call is answered.

> There is vulnerability with the two-factor authentication on WhatsApp. If a user switches off their phone at night, the password recovery system can be made to call and name the code, this code can be accessed using voicemail since most passwords are still weak.

To avoid becoming the next victim, always keep your WhatsApp updated! Has your phone been hacked? Please contact us immediately at TCG Digital Forensics in Cape Town and Centurion – give us a call on 021 110 0422 or email contact@tcgforensics.co.za

Friday, 7 December 2018

Cellular Forensics and Radar Analysis help find Plane Crash Site in Record Time!


Did you know that involving experts in the cell phone and radar analysis fields can not only save time in finding a crash site, but also save lives! By using cellular forensics and radar analysis, the search area is made smaller and urgent matters, such as saving the lives of those who were involved in the crash, can be resolved.


On the 19th of November 2019 in North Dakota, a Medevac plane was reported missing. By using the power of cellular forensics as well as radar analysis, the Civil Air Patrol’s National Radar Analysis Team and the National Cell Phone Forensics played a massive part in saving the day. These two teams were able to aid the rescue team in finding the terrible plane crash site.

So how did the two teams manage to identify the precise spot where the plane went down? Well, using cellular data forensics and partnering with the power or radar data forensics, they prepared a detailed map showing where the plane crash was located. After they supplied the map to the CAP’s North Dakota Wing, state and local authorities, they were able to then discover the passengers who were all fatally injured.

Details from the cellular forensics data and the radar analysis show that the plane may have been destroyed while it was still in the air; however nothing has been confirmed yet.

The cellular devices of the three deceased plane passengers were used by the cellular forensics experts to detect, to the meter, exactly where the plane had gone down.

Although the outcome of the search was not what the cellular forensics team, the radar analysis team and the authorities had hope for, it is amazing to see that when these two teams joined together they were able to give detailed information on exactly where the plane crash site was – all in record time!

At TCG Digital Forensics we offer reliable and affordable cellular forensic analysis services in Cape Town as well as Johannesburg - do not hesitate to contact us today on 021 110 0422 | 087 001 0523 or email contact@tcgforensics.co.za

Tuesday, 4 December 2018

Let us recover your Digital Evidence quickly and easily!


People use their computers for almost everything; many of these things can be used against you. Hiding money, illegal activities, inappropriate emails and just about anything you can think of.

Image result for digital evidence

Often, if you are trying to hide something, you’ll make an effort to completely clean out your computer by deleting “everything” and reformatting. The problem is, when you contact IT support and you are told that all is lost, they probably have no idea what a digital forensic investigator can do!

The harsh truth is that the evidence is still there waiting to be found you just can’t see it. The only question is – do you want it recovered or not?

Many businesses that have a disgruntled employee, or feel that an employee is involved in unacceptable activities at work, may want to acquire some digital evidence, they can use a digital forensic investigator to recover all the evidence that they need.

We at TCG Digital Forensics are pleased to provide all the evidence that you need off of a computer, cellular device, laptop or tablet. The obvious advantage that we have here is that we recover digital evidence that few others could and keep all affairs private.

Need something recovered? Don’t hesitate to give us a call on 087 001 0523 or email contact@tcgforensics.co.za

Wednesday, 3 October 2018

Cellular Best Practices for At-Risk Individuals

Image result for using computer

Email


· Register a unique email address to use when setting up your phone. Do not use your usual email address. You can add that later as a functional email account.

· Use a totally unique password for the email account with which you setup your phone.

· NEVER give anyone the above email address or password and do not use that email address for anything else.

· iPhone is safer than Android – provided that you follow these guidelines – specifically around using an anonymous email address.

· Always use solid, complex passcodes.

Data

· Enable encryption to secure your data if your phone ever gets lost.

· NEVER migrate data between phones. Rather back the data up and transfer it separately.

· NEVER hand your phone to anyone. Keep it in your hands if you need to show them something.

· Avoid linking your phone to any computer you do not have control of.

· KNOW what data you are backing up to Google, WhatsApp etc. be sure it is the minimum required information and no more.

General

· Keep apps to a bare minimum – if you don’t use it or need it, take it off!

· Never jailbreak an iPhone or root an Android device – only load apps from the relevant app store.

· Avoid using Wi-Fi. Only use Wi-Fi that is manually configured with a hidden SSID and Mac Addressing linking your phone to it. Outside of this, leave Wi-Fi OFF completely.

· Unless you absolutely must use Bluetooth – disable it

· Ensure that Kaspersky or Bitdefender are loaded on your device.

· Make sure that your handset is configured to automatically update your operating system – security vulnerabilities are exposed regularly and fixed. You need them!

For a wide range of digital forensics services including fraud investigations, CFE in South Africa, cellular forensics, service of summons, penetration testing, data recovery and so much more - give us a call now on 087 001 0523 / 021 110 0422 or email contact@tcgforensics.co.za. For more information visit our website here... www.tcgforensics.co.za

Wednesday, 9 May 2018

Do you know the History of Digital Forensics?

Before the 1980s, crimes involving computers and digital devices were dealt with using existing laws. So, the field of digital forensics is relatively new. While its history may be short, it is quite complex.

Image result for old computer typing

As the years went by, the range of digital crimes being committed increased, but it was not until the 1980s that federal laws began to include computer offences. Canada was actually the first country to pass legislation in 1983, followed by the US Federal Computer Fraud and Abuse Act in 1986.

The fact that computer and digital crimes grew so much during the 1980s and the 1990s caused law enforcement agencies to start making specilised groups to deal with the technical aspects of the investigation. For example, the Computer Analysis and Response Team that the FBI formed in 1984.

Throughout the 1990s there was a high demand for these new investigative resources, this lead to the creation of regional and even local level groups to help handle the load. But, it was not until 1992 that the term “computer forensics” was actually used in academic literature.

Since the year 2000, a lot of people and agencies have written and published guidelines for digital forensics. A European lead international treaty, the Convention on Cyber crime, came into force in 2004 with the aim of reconciling national computer crime laws, investigative techniques and international co-operation.

Image result for digital forensicsThe issue of training also received some attention. Companies, such as forensic software developers, began to offer certification programs, and digital forensic analysis was included as a topic at the UK specialist investigator training facility.

Since the late 1990s digital devices have become available everywhere, basically everyone has a phone or some kind of digital device. Devices have advanced way beyond simply communicating, they are great forms of information, even for crime not usually associated with digital forensics. However, digital analysis of phones has lagged behind traditional computer media, mostly because of problems over the ownership of the devices.

The complex field of digital forensics will always have unresolved issues. Many issues will include; increasing size of digital media, the wide availability of encryption to basically everyone, the variety of operating systems, increasing number of people owning multiple devices and lets not forget the legal limitations on investigators.

The TCG Digital Forensics Division is based in Cape Town and combines the experience digital forensic seasoned investigators with the latest technologies to achieve the results that you require! We do all forms of Digital Forensics such as Cyber Forensics (Penetration Testing / Hacking Recovery / Cyber Investigations), Cellular Phone Analysis, Hard Drive Analysis, Device Acquisitions and Due Diligence Investigations.

Wednesday, 25 April 2018

What can you do to keep your Broken Phone’s Data Safe?


Only you know how valuable the data on your mobile phone is, what you do with the information is up to you. So, do you know how to keep your personal data safe on your phone when it suddenly breaks?

Image result for cracked phone

The answer isn’t a simple one – how do you use your phone when the screen is cracked? It happens a lot more often than you think. The question is what do you do to protect your data when you can’t use your phone properly?

Here are a few things you can do to make it difficult for anyone without professional forensic skills to get to your stuff…

      1.       Use a secure lock screen – Swiping to unlock is easy enough for a monkey to do, so make sure you always lock it properly!

      2.       Set up Find My Device – Install Find My iPhone on your iPhone or Find My Device on your Android from Google Play Protect. Even if you can’t use the phone you can still access the data.

      3.       Change your Password – Use another device to change your Google password, this extra step will stop anyone from accessing your data and ensuring damage is minimal.

      4.       You may need to speak to a Professional – If you feel your data is precious enough to stress over, then you need to hire someone such as a professional digital forensic expert to assist you in retrieving or destroying it.

Related image

Looking for both cellular and computer forensics services? TCG Forensics is a digital forensics company in South Africa that is always at your service. We generally work directly for private investigators, polygraph examiners, attorneys and similar parties although we can accept a direct brief from a corporate entity that requires our services. We are able to assist bona fide law enforcement agencies with the procurement of forensic software and hardware once credentials have been verified.

Wednesday, 7 February 2018

Smartphone Safety for Children

It’s 2018, we’re more connected than we were a few years ago and we’re continuing to grow as time goes by.

Related image

These days, teenagers and even small children are getting caught up in all the new technology that is being introduced. The ability to communicate with friends with the push of a button is a sought after thing, and having a smartphone is a privilege that all teenagers assume they should have. However smartphones can bring a few dangers with them.

It’s about time you sit down with your children and have a chat with them about smartphone safety…

You will never be able to remove them completely from the world of technology, so make sure to sit down and have an educational conversation instead of arguing with them.

Who are they talking to? Are they chatting to their friends or someone they met online? Let them know that people are usually not who they seem to be online and they should apply “stranger danger” online as well as in the street.

What kind of content are they looking at? Are the apps, games, videos, etc. they’re looking at appropriate for their age? Remember to be aware of any cyberbullying is taking place.

Are they texting and driving? Texting and driving is beyond dangerous, especially for young teens who have just started driving and have little experience. There are apps you have use to control this, but there should be strict rules in place too.

Related image


Do you have any questions about smartphone safety or cellular forensics? At TCG Digital Forensics, we offer a range of services, from cyber forensics and mobile phone analysis to image enhancements and suspect profiling. Contact us on 087 001 0523 or contact@tcgforensics.co.za

Wednesday, 11 October 2017

What is Mobile Phone Analysis?

As mobile devices become more and more dominant in our lives, the opportunity to store and circulate information is more possible than ever.

Image result for holding mobile phone

Mobile devices have many different features, like the ability to take photos and videos. When a multimedia file is taken, many devices automatically embed GPS location of the handset at that time. This then allows the location of the user at that exact moment to be established at a later date.

Multiple communication features, such as Bluetooth, WiFi 3G and 4G enable the transfer of information that can even cross international boundaries. Users can browse the internet, send and receive emails, post blogs and even removable media cards can be inserted into the device allowing information to be exchanged.

Depending on the client, the following information can be recovered from a mobile phone:
  • SMS
  • Email
  • Call history
  • Photos
  • Videos
  • WhatsApp history
  • Passwords

Mobile devices are similar to computers, but with far more powerful capabilities. The value of the evidence found on a smartphone or any other mobile device must never be overlooked! The TCG Forensic Division has the cellular and digital expertise to extract and uncover the evidence you need. 

Wednesday, 30 August 2017

What being a Digital Forensic Expert is all about

As technology advances, those in the criminal justice and criminology fields have to learn to change with it. More people conduct business online, and more occupations require at least some use of a computer or cellular phone.

Related image

To fight crimes involving computers and mobile phones, new career opportunities for digital forensic experts have started to become more popular.

What do digital forensic experts do? Well, as the name implies, they reconstruct and analyze digital information to aid in investigations and solve computer-related crimes. They can look into incidents of hacking, recover chat history and even recover lost or stolen data.

Some of the services of a digital forensic expert often include:

- Recovering data from damaged or erased hard drives

- Gathering and maintaining evidence

- Working with cellular devices, computers and other electronic equipment

-  Digital image enhancement

- Recovering SMS or chat history

Private companies and government organisations may employ digital forensic investigators full time, or they may contract for their services. Investigators will likely be involved in looking for violations of company policies regarding computer use as much as they will be involved in crime solving.

In addition to computer skills and related education and certifications, digital forensic investigators and digital forensic experts must also possess strong analytical and investigative skills. They need to be able to read and interpret data and to formulate conclusions, and they must be able to present their findings and conclusions in a format that can be easily understood.

A digital forensic expert’s job is both stimulating and rewarding. It allows you to put your unique skills and knowledge to work in a field that is truly helpful to others.

Wednesday, 23 August 2017

The Forensic Division

Digital Forensics (cellular & computer based) requires much more than a well-developed software that can be purchased over the internet. It requires a thorough understanding of the investigative process, the law of evidence, excellent problem solving skills, a strong attention to detail as well as an appropriate background to criminal and civil investigations. 

Image result for digital forensics

We combine the experience of seasoned investigators with both criminal and civil backgrounds with the latest technologies to achieve the results that you require. 

Cellular phones all carry data on them – often more than we realize. Cellular forensics is the science of retrieving what is seen as well as what has been erased. We are able to achieve full recovery of deleted text messages, WhatsApp conversations and images.

Computers hold a wealth of information unseen. To the untrained eye, data may well be gone, deleted forever. This is however most commonly not the case.

Using state-of-the-art software and hardware processes we are able to recover e-mails, conversation threads, photographs, files and related data to show traces of what has been done when and how on computers, laptops and tablets.

Our forensic services are designed around the needs of attorneys, investigators and forensics audits, but also cover a wider scope. Some of the digital forensic and cellular forensic services we provide, in Cape Town and nationally, are:

      -          Cellular Forensics (Full profile)
      -          Data Recovery
      -          SMS Recovery
      -          Recovery of Chat History
      -          Recovery of WhatsApp History
      -          Digital Suspect Profiling
      -          Digital Image Verification
      -          Image Enhancement
      -          CCTV Footage Enhancement
      -          Password Recovery
      -          Mail Recovery


Related image


Should you require our assistance with forensic assessment of a cellular device, tablet, computer, laptop or server, please don’t hesitate to contact us at any time. Our offices are based in Cape Town; however we have reach to the rest of the country as required.

Contact The TCG Forensic Division today to discuss your requirements - call 079 691 0138 or email craig@tcgforensics.co.za

Wednesday, 2 August 2017

Recovering your Data Quickly and Easily

People use their computers for almost everything; many of these things can be used against you. Hiding money, illegal activities, inappropriate emails and just about anything you can think of.

Image result for forensics

Often, if you are trying to hide something, you’ll make an effort to completely clean out your computer by deleting “everything” and reformatting. The problem is, when you contact some IT support companies and you are told that all is lost, they probably have no idea what a digital forensic investigator can do!

The harsh truth is that the evidence is still there, waiting to be found, you just can’t see it. The only question is, do you want it recovered or not.

Many businesses that have a disgruntled employee, or feel that an employee is involved in unacceptable activities at work, may want to acquire some digital evidence, they can use a digital forensic investigator to recover all the evidence that they need.

At the TCG Forensic Division we can supply you with cellular, hard disk drive forensics and digital suspect profiling.

Need something recovered? Don’t hesitate to contact us today to discuss your requirements - call 079 691 0138 or email craig@tcgforensics.co.za

Wednesday, 17 May 2017

Why is Backing up so Important?

Your operating system can be reinstalled and so can all your programs and applications; however it can be almost impossible to recover all your original data if something were to happen.

Image result for backing up data

Because of the new ransomware taking over – WannaCry – it is now clearer than ever that backing up your important data and having a plan in place is an essential step every NEEDS to take.

Many things could lead to your data disappearing, but either way, a backup of your data should be done on a regular basis.

Here’s why…

One day your hard drive WILL crash. It is inevitable one day all your data will be lost and you need to be prepared for that day! It doesn’t have to be a nightmare when it happens. Why? Because you should have a backup on hand that’ll allow you to stay calm and carry on working.

Everyone has something to lose. It could be family photos, work documents or a collection of movies you’ve had for years. Either way, don’t be lazy and tell yourself you’ll back up tomorrow and push it aside or convince yourself you won’t miss the data you lose – every single one of us needs a backup!

Backing up is simple. Now that you have decided that backing up is important, you need to actually do it! Luckily at The Computer Guyz we are here to help. Contact us on 087 001 0511/2 or email sales@tcgcape.co.za. Should you have data that has already been lost and you need it recovered, our TCG Forensic Division is here to assist you! Email info@cellularforensics.co.za!


Stop whatever you are doing right now and put it on your list of things to do! And most importantly tell everyone around you as well as your work colleagues and employees to do a backup too!

Wednesday, 26 April 2017

Russian Hacker Sentenced to 27 years Behind Bars!

Next time you think about learning how to hack illegally, think about this man! The 32 year old son of Russian parliament member, Valery Seleznev, was recently sentenced to spend 27 years behind bars for his cybercrimes.

Image result for hacker

The hacker’s crimes were: stealing millions of payment card details from businesses by infecting malware into their point-of-sale systems.

27 years is a long time, in fact, it is the longest ever given out in the US for hacking or computer crimes!

The son of Seleznev, Roman Seleznev, was sentenced last Friday in Washington after being found guilty of a range of crimes including; wire fraud, intentional damage to a protected computer, obtaining information from a protected computer, possession of unauthorized access devices and aggravated identity theft.

In the dark world of cybercrime Roman Seleznev was known for trading stolen payment card data. He would use a few aliases – Track2, 2pac or nCuX – and he succeeded in selling millions of private credit card details to criminals all over the web.

Authorities in the US say that for about four years Seleznev infected malware into more than 500 businesses, where he would then capture all their card data and transfer it to servers under his control.
When he was arrested a few years ago, the laptop that he owned had more than 1.7 million stolen credit card numbers on it!

To try and get mercy Seleznev sent a letter to the judge earlier this month. He explained how his rough childhood including his life of poverty and his parents’ divorce had affected him deeply. His mother’s death when he was just 17 sent his world spiralling out of control; he had to drop out of college and try to pay the bills.

Image result for credit card hacking

During this tough time is when he discovered the trading of credit card data and that he could use his computer skills to hack into businesses.

After Seleznev’s strict sentencing, he made a statement of a different tone, claiming he was a political prisoner that was kidnapped by the US government.

A hacker can target anyone - even you! It can happen to anyone, so if you feel your computer or private data has been hacked do not hesitate to contact our TCG Forensic Division. Our digital forensic experts will assist you in any way you need! Call 087 001 0511/2 or email info@cellularforensics.co.za

Wednesday, 5 April 2017

How Digital Forensics can Help Convict Criminals

When it comes to using computers for crime, it is impossible for the evidence to just disappear. Digital forensics has become a crucial tool that is used to find out a criminals motives, actions and location. 

Related image

The TCG Forensic Division uses the latest forensic technology and the most qualified investigators to find the evidence that you need. If you are in need of forensic recovery services, feel free to contact the TCG Forensic Division on 082 886 8327 / 087 001 0511/2 or email info@cellularforensics.co.za

When Kari Baker, a 31 year old teacher, died of a sleeping pill overdose everyone thought she had taken her own life. Her body was found with a suicide letter and a bottle of sleeping pills close by, but her family had suspicions that it was her husband, Matt, that was responsible for her death.

Because of problems that occurred in the investigation of Kari’s death, Matt walked free. However new evidence emerged when Kari’s parents instigated a wrongful death lawsuit.

Apparently the story of Kari killing herself was completely wrong! It came to light that Matt had really killed his wife. He slipped her some sleeping pills, waited for her to fall asleep and then suffocated her with a pillow.

The real evidence though was the important data recovered from his laptop’s hard drive and the main computer server at the youth centre where he worked. Digital forensic specialists were able to pull up data and reveal that Matt had searched online for information about overdosing on sleeping pills and he even looked at pharmaceutical websites after she died.

A computer forensic expert who was involved in the case also discovered that Matt regularly looked at pornographic websites and sites where married people went to have affairs.

Matt Baker was sentenced to 65 years in prison for murdering his wife Kari.

Technology continues to play an important role in our everyday lives, because of this digital forensics has found a way for experts to convict criminals using digital evidence.

Wednesday, 26 October 2016

How a digital device becomes involved in a crime

Crimes committed using a digital device essentially employ a hi-tech method to carry out what is usually a traditional crime. Thus, crimes such as blackmail which traditionally evoke images of newspaper cuttings collaged together to create the archetypal ransom note nowadays employ computers to produce the ransom note, be it a printed document or an email.

Image result

Examples of other traditional crimes where a digital device has been applied include instant messaging, which can used to commit harassment; email, which is applied to commit fraud though 'phishing' scams; mobile phones to record assaults in what has come to be known as 'happy slapping' and then there are the peer to peer file sharing programs which have been used extensively to download and distribute pictures portraying pedophilia.

The list, it seems, is endless and so is the workload on any hi-tech crime unit to deal with such cases.

Not all crimes committed using a digital device use it as a means to an end. Hacking a computer system without authority is a crime targeted at the computer system itself. So to is a denial of service (DOS) attack on a websites or the intentionally distribution of a virus.


At DLA Digital Forensics, we combine the experience of two seasoned investigators with both criminal and civil backgrounds with the latest technologies to achieve the results that you require. From data recovery, recovery of chat history, digital suspect profiling and so much more - contact DLA today!

Wednesday, 12 October 2016

The Importance of a Strong Password

Too many people come to us in a frenzy complaining that either their data has been lost or stolen OR they simply cannot remember their password. When you don’t have a password you cant access or protect your files, on the other hand even if you do have a password you need to ensure it is 100% foolproof so you don’t end up being the victim!

Image result

DLA offers password recovery services for businesses and personal computer users, using only the latest technologies to achieve the password recovery results you need. Our forensic recovery service includes recovering passwords from zipped files, word documents, excel files and of course logon profiles on computers.

We are able to access what cannot be seen using the latest forensic technology. Using state of the art cellular forensics tools we are also able to bypass 98% of device passwords to read the device directly without needing to know the handsets logon or password. 

We can also perform cellular forensics as well as data recovery from laptops, computers, cell phones and media devices such as tablets.

Do not hesitate to contact DLA for professional and affordable services in Cape Town and the surrounding areas!


Wednesday, 11 May 2016

The Anatomy of a Mobile Attack

A mobile attack can involve the device layer, the network layer, the data centre, or a combination of these. Inherent platform vulnerabilities and social engineering continue to pose major opportunities for cyber thieves and thus significant challenges for those looking protect user data.


If you’ve been the victim of a mobile attack, don’t hesitate – contact the digital forensic experts at DLA and we can help you recover your precious cellular data quickly and effectively.

ATTACK SURFACE: DEVICE

Browser
- Phishing
- Framing
- Clickjacking
- Man-in-the-middle
- Buffer Overflow
- Data Caching

System
- No Passcode / Weak Passcode
- iOS Jailbreaking
- Android Rooting
- OS Data Caching
- Passwords & Data Accessible
- Carrier-Loaded Software
- No Encryption / Weak Encryption
- User-Initiated Code

Phone / SMS
- Baseband Attacks
- SMishing

Apps
- Sensitive Data Storage
- No Encryption / Weak Encryption
- Improper SSL Validation
- Config Manipulation
- Dynamic Runtime Injection
- Unintended Permissions
- Escalated Privileges

Malware

ATTACK SURFACE: NETWORK

- Wi-Fi (No Encryption / Weak Encryption)
- Rogue Access Point
- Packet Sniffing
- Man-In-The-Middle (MITM)
- Session Hijacking
- DNS Poisoning
- SSL Strip
- Fake SSL Certificate

ATTACK SURFACE: DATA CENTRE

Web Server
- Platform Vulnerabilities
- Server Misconfiguration
- Cross-site Scripting (XSS)
- Cross-Site Request Forgery (CSRF)
- Weak Input Validation
- Brute Force Attacks

Database
- SQL Injection
- Privilege Escalation
- Data Dumping
- OS Command Execution