Half Sized Blog Element (Single Author Style)

Half Sized Blog Element (Multi Author Style)

Digital Forensic Acquisition

One of the key aspects of conducting digital forensics pertains with the proper collection and authentication of the evidence. If the evidence is not collected properly, there is a very good chance the results of the examination will be questioned. Following digital forensic best practices, we typically conduct our examination on copies, often referred to as “forensic images” of the original evidence.

Microsoft Office 2008 12.2.5 Update for Mac OS X

Microsoft has released security bulletin MS10-038. This security bulletin contains all the relevant information about the security updates for Microsoft Office 2008 for Mac OS X.  To view the complete security bulletin, visit the following Microsoft website: http://www.microsoft.com/technet/security/bulletin/ms10-038.mspx This update improves security. It includes fixes for vulnerabilities that an attacker can use to overwrite the […]

Digital Forensic Acquisition

One of the key aspects of conducting digital forensics pertains with the proper collection and authentication of the evidence. If the evidence is not collected properly, there is a very good chance the results of the examination will be questioned. Following digital forensic best practices, we typically conduct our examination on copies, often referred to as “forensic images” of the original evidence.

Microsoft Office 2008 12.2.5 Update for Mac OS X

Microsoft has released security bulletin MS10-038. This security bulletin contains all the relevant information about the security updates for Microsoft Office 2008 for Mac OS X.  To view the complete security bulletin, visit the following Microsoft website: http://www.microsoft.com/technet/security/bulletin/ms10-038.mspx This update improves security. It includes fixes for vulnerabilities that an attacker can use to overwrite the […]