social media

/Tag: social media

Best Practices for Preserving Social Media Evidence

In our earlier post on this topic, Best Practices for Searching Social Media for Evidence, we described a universal approach for searching the internet to locate and identify social media evidence. In this article we will discuss the best practices for preserving social media evidence, the rules of evidence that apply and steps that can be taken to overcome anticipated admissibility issues. Read the Full Article>

2019-05-07T17:04:23-04:00June 11th, 2018|Categories: Investigations, Social Media|Tags: , , , , , |Comments Off on Best Practices for Preserving Social Media Evidence

IRIS LLC Hosts Training for the CT Division of Public Defender Services

Thank you to everyone from the Connecticut Division of Public Defender Services who attended our latest digital forensics training seminar on Thursday, April 5, 2018, in Hartford, CT.  IRIS LLC Cellebrite Reports-Quick Start User Guide It was a great opportunity to share our vision of promoting a universal standard for managing cell phone forensic extraction reports and preserving social media evidence in accordance with the best practices and industry standards. Harness the power of knowledge:  Free guide and other investigative resources available in our Digital Evidence Toolbox. https://www.irisinvestigations.com/iris-digital-evidence-toolbox/

2019-10-03T13:51:33-04:00April 16th, 2018|Categories: Cell Phone Forensics, Social Media, Training|Tags: , , |Comments Off on IRIS LLC Hosts Training for the CT Division of Public Defender Services

The Best Data Security and Identity Theft Prevention Methods for 2018

Learn how to take a proactive approach to data security and prevent becoming a victim in the first place. READ THE ARTICLE: The best data security and id theft protection for 2018

Hackers sought a $23,000 ransom after freezing a N.C. county’s website. They’re not getting it.

A county employee in North Carolina on Monday opened their inbox and clicked on a phishing email, inadvertently pulling up an attachment containing spyware and appearing to expose the county's computer system to hackers overseas.  The hackers, believed to be operating from Iran or Ukraine, asked the county for $23,000 to unfreeze the system, Mecklenburg County officials said. They gave the county an email address and instructions on how to pay the ransom.  They also gave the county a deadline — 1 p.m. Wednesday. READ THE FULL CHICAGO TRIBUNE ARTICLE HERE>

2019-09-19T14:15:27-04:00December 11th, 2017|Categories: Computer Forensics, Investigations|Tags: , , , |Comments Off on Hackers sought a $23,000 ransom after freezing a N.C. county’s website. They’re not getting it.

Best Practices for Searching Social Media for Evidence

Researching the online publicly available presence of potential parties, witnesses, the scene, even your own client should be a routine practice.  It should follow the best practices, begin as soon as possible, be fully documented and be regularly monitored. Read the full article here>

2019-09-19T14:06:29-04:00December 5th, 2017|Categories: Computer Forensics, Investigations|Tags: , , |Comments Off on Best Practices for Searching Social Media for Evidence