2016’s Most Common Passwords
Do you know someone who’s account was hacked this past year? Perhaps it was you? With the sheer number of services notifying users of account compromises, there’s a good chance ...
Read MorePeak Forensics has moved to a new location!
Peak Forensics has moved to a new location. Please note our new address for your records. We are now located at: 16427 N. Scottsdale Rd., Suite 410 Scottsdale, AZ 85254 ...
Read MoreCell Phones and Mobile Device ESI Collection
The days of limiting an ESI collection to computers, email and server data are long behind us in the world of computer forensics and e-discovery. Chances are very good that ...
Read MoreSocial Media Account Collection
We all know one. One person who posts every mundane event in his or her life in excruciating detail on Facebook or Instagram. Don’t we all need to see 32 ...
Read MorePeak Sponsors the 2016 Barristers Ball Benefiting the Maricopa County Bar Foundation
Peak Forensics, a leader in computer forensics, ediscovery and expert witness consulting is proud to be a sponsor of the 2016 Barristers Ball Benefiting the Maricopa County Bar Foundation. “Peak ...
Read MoreReflections On The OPM Data Breach
As I sit here reading my data breach notice from the United States Office of Personnel Management regarding their loss of my personal information (name, DOB, SS#), I can’t help ...
Read MoreThe Ponzi Scheme meets Bitcoin
White collar crime and the Ponzi scheme have certainly made their move into the 21st century. Recently, Engadget (www.engadget.com) featured an article about the use of the electronic currency Bitcoin ...
Read MoreClassic Software Tools
As I sit each day gazing into multiple computer monitors, working on various computer forensics or ediscovery projects, it occurs to me that, despite having lots of advanced forensic software ...
Read MoreComputer Forensics – One for the “win” column (v1)
Recently, Peak was asked to assist a law firm who’s client, a large service provider (we will call them “Company A”), had had an account manager leave abruptly and go ...
Read MoreApple Time Machine as a Discoverable Data Source in Forensics and Ediscovery
For years, parties to litigation have been demanding the production of data from various electronic sources. These sources have included desktop computers, laptops, servers, emails, and, most recently, mobile devices ...
Read More