Password management; necessity and cost savings
Published: 2 May 2019, Rémon Verkerk Online headlines and leading security bloggers make headlines daily about yet another data breach, with personal data and login credentials being posted on the street. Last month, for example, researchers came across multiple online…
Read moreRetrieve files yourself without data recovery software
Rémon Verkerk, April 15, 2019 From the terminology “data recovery” you can already conclude that deleted files are not always permanently disappeared from a storage medium. Often files are only labeled by the operating system as data that can be…
Read moreI’m an expert!
Rémon Verkerk, 8 April 2019 What would the world have looked different 10 years ago, if I had the knowledge and resources at my disposal today. Well, I am well aware of the degree of arrogance i exhibit with this…
Read moreMissed opportunities – search with blinkers on
Published: 25-03-2019, Remon Verkerk A digital forensic scan provides a wealth of new information that can contribute to the finding of truth. What have been an individual’s activities in a certain period of time, with whom has communication taken place,…
Read moreUnsolved crimes
Published: 15-03-2019, Rémon Verkerk At the beginning of 2019, the Dutch police counted a total of 1774 cold cases. Since 2013, the police have been working structurally to resolve these cases, of which some 57 have now been resolved. The…
Read moreData recovery: what to do if the backup doesn’t work?
Published: 15-03-2019, Remon Verkerk Data is fragile and an accident is often in a small corner. Unwittingly, files are erased or can no longer be accessed by, for example, hardware failure or at the hands of yet another outbreak of…
Read moreMissed opportunities – identification of data sources
Published: 05-03-2019, Remon Verkerk Computers, smartphones, IP camera, drones, cars, smart lighting and kettles; what do these objects have in common? They can potentially contain digital data that could contribute to a truth finding investigation. This evidence may be supportive…
Read more‘Looking differently’ offers new insights into research
Published: 04-03-2019, Rémon Verkerk English bombers returning from their flights over Germany during WWII were analysed for bullet holes. These extensive analyses were carried out to understand where the bombers were most affected and were therefore most vulnerable. In those…
Read moreDemonstrate ill will or negligence in digital evidence
Published: 27-02-2019, Rémon Verkerk Cyber security is a hot topic. Organizations are increasingly investing in preventive measures to keep cyber criminals out and protect their data. Better to prevent than to cure, right? However, it is an illusion to feel…
Read more