Meltdown and Spectre Threat Continues

The roller-coaster that is Meltdown and Spectre has been a unique ride, and doesn’t appear to over. But there is more to take away from this story than a prolific vulnerability. The security world stood in shock and awe early this year as news of Spectre and Meltdown began circulating.  … Read More

Deleted Is Not Really Deleted?

A commonly held adage in the field of digital forensics is that “Nothing is ever really deleted”.  A recent announcement by the Department of Justice regarding the missing Strzok/Page text messages completely supports that line of thinking.  In an article posted on the Fox News Channel website (Jake Gibson & … Read More

Recovering from BitPaymer Ransomware – Part 2

This is part two of a special report on the effective recovery from a BitPaymer ransomware attack, including data recovery without paying the ransom. Part one: http://mccann-cyber.com/recovering-bitpaymer-ransomware-pt1/   The BitPaymer Infected Server: The client presented after the expiration for the ransom demand and well after the malware had spread to … Read More

Recovering from BitPaymer Ransomware – Part 1

This is part one of a two-part special report on the effective recovery from a BitPaymer ransomware attack, including data recovery without paying the ransom. Ransomware is a malicious type of software that infects a computer by writing code that encrypts or blocks access to the files on the computer … Read More

Cryptocurrency: Why Lost or Stolen Coins Must Be Documented

As the rise of the popularity of cryptocurrency barrels toward a paradigm shift in the economy, some traditional issues, as it relates to crypto being an asset, begin to surface. This includes the implications of your responsibilities when that asset is stolen or otherwise lost and unrecoverable. In 2014, the … Read More

An Introduction to Cryptocurrency

Cryptocurrency is poised to revolutionize modern monetary practices, allowing for a universal form of exchange. At some point in the past, a decentralized system of exchange was just a musing relegated to forums populated by a handful of cryptographers; then, in 2008, some messages appeared in a cryptography forum claiming … Read More

The Cardinal Ruling

Although stealing signs has been commonplace in major league baseball for decades, the type of theft that occurred beginning January 2012 from the Houston Astros computer network was unprecedented in professional sports. The case began with the Federal Bureau of Investigation investigating allegations that a member of the St. Louis … Read More

Solicitation of a Minor

One of our forensic expert Nick’s toughest cases to date involves the sexual abuse of a minor. It serves as a warning to parents to keep a close eye on the people your children associate with, as well as a lesson on how to preserve evidence in any form of … Read More

Self Sabotage

Cases involving estranged or divorced spouses are always delicate. The situation only escalates when one of the parties worries the other is spying on them to gain leverage. Our forensic expert Brett handled a case involving a client who was convinced their estranged spouse put spyware on their mobile devices. … Read More