Combating Global Corruption with Digital Forensics: Organized Crime

In a recent post, we took a look at the invaluable role that digital forensics can play in helping to combat global corruption in the business world, focusing in particular on the issue of workplace sexual harassment. However, as we noted in that original post, corruption is a pervasive problem that takes many forms, and …

Combating Global Corruption with Digital Forensics: Workplace Harassment

Corruption is a pervasive problem that takes many forms, and digital forensics can play a vital role in combating it, providing investigators with invaluable forms of digital evidence that did not exist just ten or twenty years ago. Even so, corruption remains an enduring challenge for organizations of every stripe—from government agencies to Fortune 500 …

Oxygen Forensics Offers FREE Remote Training During COVID-19 Crisis

The COVID-19 pandemic has reshaped our world almost overnight—upending daily routines and disrupting much of the global economy. Unfortunately, crime never takes a day off, not even during times of crisis. Ongoing digital forensics investigations have lost none of their urgency, and investigators still need resources that will enable them to use their tools to …

Fighting Fentanyl with Data: How Law Enforcement is using Mobile Data to Combat the Opioid Crisis

This year, much of the conversation surrounding the growing opioid epidemic in the United States has centered on drug manufacturers and distributors. In October, four large drug companies reached a $260 million legal settlement with two Ohio counties over the crisis. Pharmaceutical giant Johnson & Johnson reached a similar agreement with Ohio state prosecutors earlier …

Everything you ever wanted to ask about Checkm8 and Checkra1n

What’s Checkm8? Checkm8 is an exploit (program exploiting OS or hardware vulnerabilities) aimed at obtaining access to the execution of its own software code at the earliest stage of iOS device loading. What makes it stand out? The richness, and honestly the hype, surrounding Checkm8 is that the vulnerability, which it is based, cannot be …