McCann E-Investigations Houston Computer Forensics Division Releases White Paper on Digital Debugging: What is Spyware and How is it Detected and Prevented

Share Article

McCann E-Investigations (McCann EI) releases white paper which explores digital bugs, also known as spyware and malware. With so much data stored on computers, laptops, smart phones and tablets, these devices are often targeted for cyber-attacks. These attacks are more often being perpetrated internally or by known associates in order to gain access to data.

Computer Forensics | Digital Debugging | Network Security | Private Investigations

We are finding that many clients are coming to us who have not been randomly targeted by a hacker, but with real network breach perpetrated by someone that they know

McCann E-Investigations (McCann EI), a Texas-based computer forensics firm released a white paper titled [What is Spyware and How is it Detected and Prevented. This paper explores the complexities of digital bugs, also known as spyware and malware. With so much data stored on computers, laptops, smart phones and tablets, these devices are often targeted for cyber-attacks. The spyware may harvest confidential and sensitive information by providing the perpetrator with remote access through the internet. Or malware may disrupt the function of the device or even an entire network causing damage and financial loss. Digital debugging involves not only detecting and documenting the bug (malware or spyware) and attempting to seek out its origin, but also installing preventative measures to stop the bug.

“We are finding that many clients are coming to us who have not been randomly targeted by a hacker, but with real network breach perpetrated by someone that they know.” said Daniel Weiss, Partner at McCann E-Investigations. “We are seeing these cases increase even more with domestic situations, such as contentious divorce and child custody as well as with our corporate clients.” Continued Weiss.

Given the increasingly complex nature of mobile devices such as (iPhones, Android based phones, iPads, Android tablets, and Microsoft tablets), cyber-attacks against these types of devices present increased danger of data breaches. These devices function much the same way as a laptop or desktop in that they store data such as emails and documents as well as text messages and phone calls. They are also used to access web-based applications (such as CRMs, banking institutions, retailers, etc.) and thus store passwords and log in information to these applications as well. As the sophistication of spyware increases, it is possible that key loggers and other malware installed on a mobile device could be just as effective for harvesting information as a desktop or laptop computer.

“Mobile devices require a different set of technology tools and techniques to interface with the data.” Said Gary Huestis, Partner and Director of Forensics Services at McCann E-Investigations. “Given the ever changing threat landscape, we have to constantly evolve our tools and techniques to mitigate the risks that digital bugs now present to mobile devices.” Continued Huestis.

Clearing the bug is only the first step of the debugging process. The second step is analyzing existing security systems such as firewalls, anti-virus programs and policies and procedures. Implementing new technologies, software and polices is the third step, so that you can be up-to-date in the affordable technology designed to keep your data and communications secure. The final step is constantly monitoring, updating and testing the solutions implemented. A digital forensic expert offers all of these solutions for your and your company’s best protection

About McCann EI:
http://www.einvestigations.com
Twitter: @McCannEI or https://twitter.com/#!/McCannEI
Facebook: https://www.facebook.com/pages/McCann-Investigations/203760582969139
Call us toll-free at 800-713-7670
About McCann EI:

McCann EI provides the complete case solution with Hybrid Investigations. The truth lies in many forms – digital and physical. McCann Investigators follow the trail and decipher the information regardless if the evidence is in digital form, such as electronically stored information found on computers, mobile phones, or other electronic devices or if the investigation requires traditional PI tools such as surveillance, undercover work or detailed record searches. McCann Investigators final product to you is a clearer understanding of what has happened or what is occurring. Clarity and the discovery of truth allows our clients to respond and recover.

Our investigators have the experience to provide expert witness computer forensic testimony in courts across Texas. McCann EI services Companies, Law Firms, and Individuals Statewide. Call us toll-free at 800-713-7670 or our Local Offices Austin Computer Forensics: 512-377-6142 Houston Computer Forensics: 832-628-4904 Dallas Computer Forensics: 214-329-9059 Lubbock Computer Forensics: 806-589-0320 Lufkin Computer Forensics: 936-585-4070 Brownsville Computer Forensics: 956-465-0849

Share article on social media or email:

View article via:

Pdf Print

Contact Author

Daniel Weiss
Visit website