Computer Forensics

Computer Forensics

Digitpol’s computer forensics experts investigate, analyse and recover forensic data from computers, portable devices and hard disk drives. We ensure that no digital evidence is overlooked and assist at any stage of an investigation, regardless of the size or location of data sources. Claims of leaks, fraud, cyber espionage, financial tampering, computer crime, employee misconduct, and other illegal or wrongdoing actions require corporations, law firms, and government agencies to deploy digital forensic methods to piece together facts that lead to the truth.

 

 

Computer forensics is the preservation, identification, acquisition, examination, and presentation of information found on computers and networks relating to a criminal or civil investigation. Computer forensics is also known as cyber forensics or digital forensics.

 

Unauthorised access

We investigate and analyse unauthorised access or hacking incidents such as when someone gains access to your computer or device without your permission. Hackers may gain access to your computer or device through security weaknesses, malware or phishing. Once they have compromised your email, banking or social media accounts, they can change passwords preventing you from accessing your account. Scammers often send out messages impersonating and directing people to fake websites, or asking them to send money. Modern attacks are very sophisticated the fake websites may seem to be geniune.

Malware

Criminals may use malicious software (or malware) to monitor your online activity and cause damage to the computer. Malware is often downloaded when people open an infected email attachment or click a suspicious link in an email. Malware can also be used to steal your usernames, passwords or other information, which is then forwarded to a third party.

‘Malware’ is a catch all term to describe different types of malware which include viruses, worms, spyware, trojans or bots.

Sophisticated attacks

Sophisticated criminals are active daily to exploit vulnerabilities on computers and other devices. Some of the techniques they use include:

  • unauthorised access or hacking – when someone gains access to your computer or device without permission,
  • malware – malicious software (such as viruses, trojans and spyware) which monitor your online activity and cause damage to the computer,
  • denial of service attacks – an attack which floods a computer or website with data, causing it to overload and prevent it from functioning properly. This type of attack is more frequently targeted at businesses, rather than individuals.
Denial of service or distributed denial of service attacks

Cyber attacks are common and often a method seen is a denial of service attack which floods a computer or website with data, which can overload the system or computer and prevent it from functioning properly. Unlike hacking or malware, it generally doesn’t involve access to the computer system. A distributed denial of service (DDoS) attack is a denial of service attack that comes from multiple systems, often a network of compromised computers.