Cyber Forensics Expert Recovers 168,000 Deleted Files from Hunter Biden’s Laptop
Computer Forensics Blog
by Cyber Forensics
1y ago
168,000 deleted files were recently recovered from Hunter Biden’s abandoned laptop. The recovered files were primarily system files, application files, or duplicates of files stored elsewhere on the device. However, some of the recovered data revealed information on financial dealings in 2018 and early 2019, in addition to data regarding his personal life. The files were recovered using a technique known as data carving.  The cyber forensics expert who recovered the documents, Gus Dimitrelos, says that the recovered data proves that the laptop belonged to Hunter Biden and was used exclusi ..read more
Visit website
Cyberforensics Expert Uncovers Proof that Hunter Biden Used Burner Apps
Computer Forensics Blog
by Cyber Forensics
1y ago
Further investigation into the documents and data stored on Hunter Biden’s abandoned laptop reveals that Biden used the applications Phoner, textPlus, and WePhone, apps that mimic “burner phones.” The applications allowed him to generate new phone numbers to make calls and text messages from his iPhone and iPad between 2014 and 2018; however, it is unclear why and to what extent he used these applications. Each burner phone application was used to make multiple purchases and item descriptions of the purchases included “Unlimited Mexico Calls, “Unlimited Calling US & Canada” and “Second Pho ..read more
Visit website
Hunter Biden MacBook Forensics Analysis
Computer Forensics Blog
by K. Gus Dimitrelos
1y ago
results of a Cyber Forensics examination was conducted on a MacBook Laptop hard drive purportedly owned and used solely by Robert Hunter Biden. The post Hunter Biden MacBook Forensics Analysis appeared first on Computer Forensics ExpertsCyber Forensics ..read more
Visit website
Cryptocurrency Fraud
Computer Forensics Blog
by K. Gus Dimitrelos
1y ago
Cryptocurrency accounts wiped out ‘in an instant’ by cyber crooks. ABC Action News I-Team Investigator Adam Walser has uncovered cyber-criminals have found ways to drain people’s cryptocurrency accounts in the blink of an eye. And currently, there’s no easy way for victims to recover their funds. The post Cryptocurrency Fraud appeared first on Computer Forensics ExpertsCyber Forensics ..read more
Visit website
Cyber Forensics Security Expert Interviewed by ABC Action News (WFTS Tampa Bay) Prior to Super Bowl
Computer Forensics Blog
by Cyber Forensics
2y ago
Super Bowl security was unbelievably tight this year, and that’s despite the fact that the Raymond James Stadium was at nearly a third of its full capacity. COVID-19 restrictions may have helped reduce the dangers of disease transmission, but when it comes to actual safety that requires the cooperation of multiple agencies.  Reporting on the topic, the ABC Action News Team for local station WFTS Tampa Bay looked to our own Gus Dimitrelos for input. An excerpt from the piece follows: “The cooperation is just unparalleled in these types of events,” said retired U.S. Secret Service Agent Gus ..read more
Visit website
As Child Pornography Proliferates, Responsibility Must Shift to Tech Providers
Computer Forensics Blog
by Cyber Forensics
2y ago
Images of child sexual abuse are, unfortunately, nothing new, but a dramatic uptick in their production and distribution has law enforcement and cybersecurity experts combating an unprecedented surge. The increasing availability of digital storage, file distribution methods, and anonymized payment systems has led to a record-breaking number of intercepted materials in the past few years. According to the National Center for Missing and Exploited Children, over 65.4 million photos and videos were reported in 2020 alone. Each contained known child pornography, formally described as child sexual ..read more
Visit website
Cryptocurrency Bitcoin Fraud
Computer Forensics Blog
by K. Gus Dimitrelos
2y ago
Cryptocurrency accounts wiped out ‘in an instant’ by cyber crooks The post Cryptocurrency Bitcoin Fraud appeared first on Computer Forensics Experts | Cyber Forensics ..read more
Visit website
Cyber Forensics Security Expert Interviewed by ABC Action News (WFTS Tampa Bay) Prior to Super Bowl
Computer Forensics Blog
by Cyber Forensics
3y ago
Super Bowl security was unbelievably tight this year, and that’s despite the fact that the Raymond James Stadium was at nearly a third of its full capacity. COVID-19 restrictions may have helped reduce the dangers of disease transmission, but when it comes to actual safety that requires the cooperation of multiple agencies.  Reporting on the topic, the ABC Action News Team for local station WFTS Tampa Bay looked to our own Gus Dimitrelos for input. An excerpt from the piece follows: “The cooperation is just unparalleled in these types of events,” said retired U.S. Secret Service Agent Gus ..read more
Visit website
Cyber Forensics In the News
Computer Forensics Blog
by Cyber Forensics
3y ago
A Tampa Bay Syndicate of ABC WFTS broke a story about a massive data breach and ransomware attack of a widely used software and data management company Blackbaud. Cybersecurity specialist Gus Dimitrelos offered his expertise on the crisis and questions the company’s transparency.  According to Dimitrelos, the company should have notified clients within 30 days of the attack. Breach notifications vary by state but in Florida companies do in fact need to notify clients within 30 days. Dimitrelos is concerned that the data company waited too long to notify its clients about the breach becau ..read more
Visit website
Device Handling and Digital Evidence Processing and Analysis
Computer Forensics Blog
by K. Gus Dimitrelos
3y ago
Using Predefined Criteria This protocol will cover all the steps needed to comply with the attached court order in case # FMCE13007297 signed by Judge Fabienne Fahnestock.  Specifically, the defined protocol encompasses all the steps taken from the onset of the collection until case reporting if requested and each area below is described in detail. Collection Acquisition/Imaging Analysis Reporting Collection Prior to moving the  storage device or data source  such as a hard drive, mobile device, cloud data, social media accounts or another form of digital data, proper document ..read more
Visit website

Follow Computer Forensics Blog on FeedSpot

Continue with Google
Continue with Apple
OR