technology rush

The Wild West of Bring Your Own Device (BYOD)

Tasha Dyson, CFECompliance, Computer Forensics, Mobile Forensics

The Wild West When you think about the Wild West, what do you see? Do you picture unspoiled scenery, picturesque cattle drives, spacious farms, gold miners, unfettered individual freedom, rugged individualism, and no federal income taxes? This is definitely a “romantic” picture. Remember the darker side. Don’t forget about the lawless gangs of robbers, disputes settled by gunfights, and clashes …

article from The Hacker News

Keyboard App Leaks Mobile Data

Amanda StricklandComputer Forensics, Mobile Forensics, News

Sometimes mobile apps do more than we think they do. Researchers at the Kromtech Security Center discovered personal data being collected by a smartphone virtual keyboard app on its 31 million users, as reported by The Hacker News. The leaked information included: Full name, phone number, and email address Device name, screen resolution, and model details Android version, IMSI number, …

digital forensics

Is the Answer on a Mobile Device?

Russell W. Gilmore, CISSP, CISM, EnCEElectronic Data Recovery, Mobile Forensics

Quite often, yes. Clients have been complaining that John, your sales representative, hasn’t been showing up to scheduled appointments for months. You have also noticed that his area sales have been rapidly declining. However, John has been submitting reports for all the expenses he’s incurred while traveling. You decided to fire John due to the discrepancies in his reports. Now …

bring your own device

Five Keys to Mobile Phone Security

Russell W. Gilmore, CISSP, CISM, EnCEComputer Forensics, Mobile Forensics

Cell phones – specifically smartphones – have become ever present in our daily lives. For personal use, the smartphone contains contact information for family and friends, pictures, and other personal information. In the business environment, smartphones connect us to email servers, contain business contacts and documents, and connect us to company servers just to name a few. When you first …

Cell Phones Are Safe… Aren’t They?

Amanda StricklandComputer Forensics, Intellectual Property, Mobile Forensics

Imagine this scenario: You’re unavoidably called out of town for the week and are reluctantly forced to delegate the operation of a meeting with some important clients to Bob, an employee who, despite his best efforts, is less than “tech-savvy.” Everything seems to be going swimmingly though, and the meeting is set to begin on time. Just before everyone takes …