McCann Investigations Introduces New Network Vulnerability Services

Share Article

McCann Investigations provides vulnerability assessments of spyware for clients

McCann Global Investigations: 25 Years of Service

McCann Investigations introduces new network vulnerability services targeting spyware on laptops, desktops and smart phones. McCann Investigations has added this service to its repertoire of IT security services and vulnerability assessments. “Our client’s use a host of devices in their normal course of business, including desktops, laptops and smart phones.” Said Daniel Weiss, Partner at McCann Investigations. “Given the extensive use of these devices, we are seeing more malware and spyware attacks which can jeopardize the users privacy and reveal proprietary company information to third parties.” continued Weiss.

McCann Investigations now utilizes two of the industry's most respected tools, the QualysGuard and Nessus Vulnerability Scanners, as well as proprietary software to identify and remediate security threats. Intruders commonly replace system programs with custom versions that perform malicious operations such as monitoring your keystrokes or providing remote access to the attacker. These types of malware are often difficult are often difficult and time consuming to detect.

The QualysGuard scanner is driven by the most comprehensive and most up-to-date KnowledgeBase of vulnerability checks in the industry vulnerability KnowledgeBase in the industry, QualysGuard delivers continuous protection against the latest worms and security threats. Performing over 150 million system audits per year, QualysGuard is the widest deployed security on demand solution in the world.

The Nessus Security Scanner detects and identifies the most malicious types of malware such as spyware and keyloggers that can capture and transmit confidential session data. The Nessus Scanner allows us to perform sophisticated remote scans and audits of Unix, Windows and network infrastructures. Any non-compliant hosts, such as systems running P2P, spyware or common malware are detected and identified.

One of the biggest concerns with mobile phone usage is the danger of mobile phone spyware. Mobile phone spy and monitoring programs can often be quickly and easily installed and can be very difficult to detect or remove. These monitoring programs can allow access and forwarding of SMS (text) messages, call history, voice mail, phone location, email, Facebook activity, Skype communications, and can even give the intruder the ability to anonymously listen to live phone calls or use the phone as a remote microphone to listen when the phone is not even powered on.

Through McCann Investigations network vulnerability services, the latest technology is used to interface directly with mobile phones to look at a much deeper level of the phone than just the visible apps. McCann Investigations uses several tools including the Cellebrite UFED forensic phone analyzer and Paraben Device Seizure to be able to connect to and query mobile phones, obtain and download file system dumps and perform full physical phone images depending on the model of the phone. McCann Investigations then uses the information obtained and imaged from the phone to search it against our database of mobile phone spyware utilities, tracking apps and monitoring programs

About McCann Investigations:

Since 1985, leading companies and executives have turned to McCann for best in class private investigative services. We provide information, insight, and influence™ that corporations, executives, law firms, accounting practices, and municipal and county governments can count on. McCann is a licensed data centric full service private investigative firm with offices in New York, New Jersey, and Texas.

Rather than having to contract multiple companies and scores of separate experts, McCann Investigations brings together a one stop investigative team that can help your company deal with all required areas of an investigation. Every McCann Investigations Partner leads a team that can perform background checks, computer forensics, network breach assessments, due diligence, and fraud investigations.

For more information about McCann Investigations, visit us on the web at http://www.mccanninvestigations.com

# # #

Share article on social media or email:

View article via:

Pdf Print

Contact Author

Daniel Weiss
Visit website