Murphy’s Law of Digital Forensics

I love digital forensics – the art and the science of it; the stories, challenges and puzzles surrounding it. In this field, nothing is impossible – there are just really difficult problems waiting for novel solutions. This blog is where I’ll share my experiences, thoughts, and ideas about our profession and how the Gillware team approaches them.

The Biggest Cybersecurity Risks for Businesses Using VoIP

Stronger connectivity, significant cost reductions, and a centralized system are noticeable advantages of switching your telephone network to Voice over Internet Protocol (VoIP). And since you […]

3 Lessons After 2,000 days in Cyber Insurance

David Kruse serves as our Director of Business Development. He comes from the cyber insurance industry and wants to share the lessons he has learned after […]

Cyber Threat Advisory Bulletin: October 2019

Current Highest-Risk Cyber Threats Ransomware As long as the criminals can make money infecting networks, Ransomware is going to be a problem.  The vast majority of […]

Podcast: Christopher Gerg and Nathan Little discuss data security in the law firm

A huge thanks to the folks at LAWsome Podcast for hosting Christopher Gerg and Nathan Little. You can find the original podcast episode and synopsis here. […]

Podcast: Christopher Gerg discusses how to protect your business data with proper cyber management

Protecting Your Business Data with Proper Cyber Management Episode Description Data is one of the greatest assets of a company, and when information is lost, it […]

Podcast: Christopher Gerg discusses cybersecurity for growing businesses

A special thanks to the Financial Gravity podcast for having Christopher Gerg as a guest. Christopher Gerg is the Chief Information Security Officer and VP of […]

How Big Data and IoT Trends Are Impacting Cybersecurity in 2019

Rapid advancements and unchecked growth have turned a few burgeoning buzzwords into hot targets bursting at the seams with sensitive, valuable information. In that time, new […]

Wire Transfer Fraud: How It Happens and Why You May Be At Risk

The term “Wire Transfer Fraud” started in the origin of this type of crime – wire transfers, which is the transfer of funds between banks across […]

15 Cybersecurity Questions Every C-Suite Needs to Ask

With the threat of cyber crime to businesses, it is clear there needs to be a shift in the conversation if any real improvements are to […]

Ransomware The Business and How They Are Crushing It

Illegal, crippling, threatening, malicious – words many may use to describe ransomware and the affect it is having on businesses across the globe. Booming? Thriving? Successful? […]

Cyber & Information Security Frameworks Explained: What They Mean and Why They Matter

With the best of intent, governments and organizations have created laws certifications, and requirements to protect payments, personal data, privacy, and communication (PCI-DSS, PCI-DSS, PCI-3DS, PA-DSS, […]

Your cybersecurity plan may be doing more harm than good

Companies are spending more to prevent cyberattacks, but not getting results. Why, and what can you do better? This article was originally published by Jason Busch […]

Incident Response Planning 101: Simplification and Preparation are Key

You walk into the office on Monday morning, yearning for a cup of coffee, mentally sifting through your to-do list for the week and bam ­– […]

Data Manipulation: A rising trend in cyberattacks, and how to address it.

News headlines featuring data-related attacks most commonly refer to either the deletion or theft of data. As cyberattacks grow in sophistication, our incident response and risk […]

“Walk before you run.” Words of Wisdom from our CISO and Vice President of Risk Management

During the next couple weeks, we’ll see countless stories and interviews with experts and thought leaders forecasting 2019’s hottest cybersecurity innovations and trends. AI, Blockchain, better […]

13 Ways to Protect Your Business from a Cyber Attack in 2019

Day in and day out we receive cases from businesses experiencing some form of a cyber attack. The vast majority of these attacks can be blamed […]

.JSON files- My Favorite Artifacts, Part Three

This month, I’m taking a stab at JSON (not to be confused with another seasonally-appropriate Jason). As a subset of JavaScript, JSON doesn’t quite qualify as an artifact […]

GandCrab V5 Ransomware

What is GandCrab V5? GandCrab V5 is a new strain of ransomware and a variation on the pre-existing GandCrab ransomware, first spotted in the wild in […]

Dharma .combo Ransomware

Kraken Cryptor Ransomware

It’s Not the Waking, It’s the Rising: Our Takeaways from NetDiligence-Santa Monica

We never have to try very hard to find an excuse to travel to California, and the NetDiligence Cyber Risk Summit was one of the easiest no-brainers when […]

LockCrypt 2.0 BDKR Ransomware

What is LockCrypt 2.0 BDKR? A new variant of LockCrypt 2.0 was discovered late in September 2018. This version is identical to the original LockCrypt 2.0 […]

Qinynore Ransomware

What is Qinynore? Qinynore is a new strain of ransomware virus discovered in late September 2018. It is a variant of Hidden Tear and, aside from […]

MobileSMS.plist and the Joy of Testing – My Favorite Artifacts, Part Two

The proper method for inquiring after the properties of things is to deduce them from experiments. ~ Isaac Newton Testing is the way to figure out […]

Smartphone User Dictionary Files – My Favorite Artifacts, Part One

“Words – so innocent and powerless as they are, as standing in a dictionary, how potent for good and evil they become in the hands of […]

What Are Forensic Artifacts? – My Favorite Artifacts, Part 0

“Wherever he steps, whatever he touches, whatever he leaves, even unconsciously, will serve as a silent witness against him. Not only his fingerprints or his footprints, […]

USB Pwny Express – Counterfeit USB Devices and Anti-Forensics

“The truth is rarely pure and never simple.” ~ Oscar Wilde, The Importance of Being Earnest Myths and Legends: This past week, I spoke at the […]

How to Prevent the Worst Monday Imaginable

For most people, Friday is the start of their weekend. At Gillware Digital Forensics, it’s actually the start of our work week. Why? Because it’s the […]

Happy Birthday #2, Gillware Digital Forensics!

“There are 10 kinds of people in the world: those who understand binary numerals, and those who don’t.” ~ Ian Stewart, Professor Stewart’s Cabinet of Mathematical Curiosities […]

Case Study: Tech Support Scams and the Real Threat of Data Breaches

A data breach that only leaks your email address and phone number might seem trivial. But here’s a look at how hackers can exploit you with […]

A Shout-Out to Amazing Sheroes in IT

No computer is ever going to ask a new, reasonable question. It takes trained people to do that. – Grace Hopper My Sheroes! Today, March 8, […]

Forensic Case Files: Employee Hard Drive Switcheroo

“On the other hand, you have different fingers.” —Steven Wright Transposition magic is a lot of fun to watch. In the blink of an eye, a […]

Forensic Case Files: Unauthorized Bitcoin Mining

“This makes me very angry, very angry indeed.”  – Marvin the Martian In Duck Dodgers in the 24½th Century, Daffy Duck (playing the part of Duck Dodgers) battles […]

Steer Clear of This Aldi Coupon Scam

Many people have likely seen this Aldi coupon scam appear on their Facebook news feed by now, and some have attempted to get the coupon. Unfortunately […]

Forensic Case Files – A New Solution for Previously Encrypted iOS Backups

“If I had an hour to solve a problem I’d spend 55 minutes thinking about the problem and 5 minutes thinking about solutions.” ― Albert Einstein At […]

Forensic Case Files: Windows Update Did It!

“I didn’t do it.” – Bart Simpson It Was Windows, Not Me… I Swear!! I spent a lot of time in my law enforcement career digging […]

Meet Stinky Audrey

“Feed Me, Seymour!” ~ Audrey II, Little Shop of Horrors When it comes to films (and musicals), the 1986 nerdy cult classic Little Shop of Horrors is […]

Smart Phone Forensics Case Study: Synchronicity & Success with Chip-On Forensics

Do the difficult things while they are easy and do the great things while they are small. A journey of a thousand miles must begin with […]

Apple Continuity and iCloud Data Leakage – When Apple Bites Back

What you don’t know can’t hurt you. ~Unknown Apple Continuity, iCloud Sync, and Digital Forensics Apple Continuity; introduced in 2014 with iOS 8.0, this nifty feature allows seamless […]

Forensics Case Files: Chip Off, Chip On, The Chipper!

“I begin by imagining The impossible And end by accomplishing The impossible.” ― Sri Chinmoy I love my work! I’ve said it before, and I’ll say it […]

Forensic Case Files: Samsung Galaxy S7 from a Fatal Motorcycle Crash

A motorcycle is a vehicle of change, after all. It puts the wheels beneath a midlife crisis, or a coming-of-age saga, or even just the discovery […]

Beats and Bytes: Striking the Right Chord in Digital Forensics

“There is geometry in the humming of the strings, there is music in the spacing of the spheres.” — Pythagoras Curiosity is a personality trait that […]

Adventures in Laptop Forensics

“Would you tell me, please, which way I ought to go from here?” “That depends a good deal on where you want to get to.” “I […]

Rename Your Roses: Tips for Preventing and Recovering from Ransomware

What’s in a name? That which we call a rose by any other name would smell as sweet. – William Shakespeare, Romeo and Juliet A Thorny […]

Forensic Case Files: Exonerating an Employee of Data Theft

“Every truth has two sides; it is as well to look at both, before we commit ourselves to either.” – Aesop Our client in this forensics […]

Forensic Case Files: A Chip-Off Our Shoulders

“Leland, in his last issue, struts out with a chip on his shoulder, and dares Bush to knock it off.” The Weekly Oregonian, 1855 In this […]

Forensic Case Files: Virtual Machine Matryoshka

“Keep thinking. You can hear our brains rattling around inside us, like the littler Russian dolls.” – M. T. Anderson In this case study, we got […]

Forensic Case Files: HTC One Mobile Chip-Off Forensics

“The number of American troops killed in Afghanistan and Iraq between 2001 and 2012 was 6,488. The number of American women who were murdered by current […]

Digital Forensics as Art and Science

“To develop a complete mind: Study the science of art; Study the art of science. Learn how to see. Realize that everything connects to everything else.” […]

Forensic Case Files: A Thumb Drive’s Winter’s Tale

“April is the cruellest month, breeding lilacs out of the dead land, mixing memory and desire, stirring dull roots with spring rain. Winter kept us warm, […]

Forensic Case Files: Impersonating Your Ex-Boss

If my forgeries looked as bad as the CBS documents, it would have been ‘Catch Me In Two Days’. – Frank Abagnale   Frank Abagnale, infamous […]

Forensic Case Files: Reviving a Samsung Galaxy S3

“What you see depends on how you view the world. To most people, dirt is just dirt. To a farmer, it’s potential.”  ~ Doe Zantamata Earlier this […]

Case Study: ZTE Prestige N9132 Chip-Off

In the late spring of 2016 we received a cell phone from Detective Robert Hale of the Town of Madison Police Department for forensic work. This was a […]

Employee Misconduct and Digital Forensics

If I had eight hours to chop down a tree, I’d spend six sharpening my ax. – Abraham Lincoln Technology and Work Time The average American […]

Ensuring the Sanctity of the Vote: Electronic Voting Forensics

Nobody will ever deprive the American people of the right to vote except the American people themselves — and the only way they could do this […]

Moving forward, looking back

I’m convinced that about half of what separates successful entrepreneurs from the non-successful ones is pure perseverance. – Steve Jobs Retirement? Friday, August 12th, 2016 was […]

Can Pokémon GO Users’ Movements be Determined Using Forensic Artifacts?

“Will you help me with my research?” – Professor Willow In my blog post on Pokemon GO, I discussed some early observations about forensic artifacts stored […]

Case Study: Employee Data Theft

“You can fool some of the people all of the time, and all of the people some of the time, but you cannot fool all of […]

Oh, No – Pokémon Go! A Sneak Peek at Forensic Artifacts

A Sneak Peek at Pokémon Go Application Forensics UPDATED 7/22/16 – Thanks to Warren Raquel (@warquel) a Senior Security Engineer at the National Center for Supercomputing Applications, Android location information […]

The Buzz About HummingBad

“The wings moved so rapidly that they were scarcely visible and remaining stationary the little bird darted its beak into the wild flowers making an extraordinary […]

CFAA – Not Just for Hackers Anymore

Sometimes one pays most for the things one gets for nothing. – Albert Einstein In my law enforcement career, I worked on a fair number of […]

Experts and Expertise in an Ever-changing Environment

 “You must continue to gain expertise, but avoid thinking like an expert.” Denis Waitley  I’ve been in Austin, TX for the past eight days at the SANS […]

Flash Memory Amnesia – Resurrecting Data through Direct Read of NAND Memory

“Anything that can go wrong, will go wrong.” That’s Murphy’s Law. How we deal with the fallout afterwards is what determines whether Murphy’s Law works for […]

Reflections on the First Month at Gillware Digital Forensics

“Those who wish to sing will always find a song.” – Celtic Proverb Just over a month ago, I made a huge leap of faith. I […]

New startup Gillware Digital Forensics makes its debut at National Cyber Crime Conference

For Press Concerns: Media Contact: Ashley Toy, Director of Marketing Phone: 877-624-7206 ext. 8890 Email: atoy@gillware.com New startup Gillware Digital Forensics makes its debut at National Cyber Crime […]

Case Study: Alcatel One Touch Fierce 2 7040N locked out

Recovery Type: Mobile Phone Internal Memory: 4GB Manufacturer: Alcatel Model Name: One Touch Fierce 2 Operating System: Android Carrier: TracFone Wireless (GSM) Model Number: 7040N Manufacture Date: 09/2014 Main Symptom: Locked out Type […]

Mobile Forensics Case Study: Motorola Moto E XT1526 locked out

Recovery Type: Mobile Phone Internal Memory: 7.8GB Manufacturer: Motorola Model Name: Moto E Operating System: Android Carrier: TracFone Wireless (GSM) Model Number: XT1526 Manufacture Date: 03/2015 […]

Case Study: TracFone Wireless LG L34C locked out

Recovery Type: Mobile Phone Internal Memory: 1.79GB Manufacturer: LG Model Name: Optimus Fuel Operating System: Android Carrier: TracFone Model Number: L34C Manufacture Date: 09/2014 Main Symptom: Locked out Type of Data: Photos, text messages, […]

Can data from Malaysia Airlines Flight 370 passengers’ cell phones be recovered?

Click here to watch Gillware’s appearance on CNN’s Out Front Update: September 30, 2015 Over a year and a half after Malaysia Airlines Flight 370 mysteriously […]