nav-left cat-right

The secret to a successful data recovery process

These days, there are plenty of data recovery services available. You can select from the individual computer technician to the computer repair shop, or the actual data recovery expert, which is usually a certified lab with advanced training, equipment and class 100 ISO clean room. In addition to that there are also data recovery software products available in abundance in the market. Therefore it would not be an exaggeration to say the market is flooded, with data recovery options.

Sometimes having many options is a good idea, but often times it can also be a burden. In this new age there is a constant information overflow, which can make it difficult to choose the right or best option. The brain simply becomes overwhelmed and overburdend with too many options.


So here is the break down to simplify the options:

  1. Commercial data recovery software such as R-studio, UFS Explorer, Stellar Data Recovery and others are a great DYI (do it yourself option) which makes sense in some situations.


  1. A computer technician or computer repair shop makes sense for data retrieval if the situation is not all that complex, but the owner of the device is not very computer literate to use data recovery software.


  1. A Data Recovery lab, is an expert services that will provide you with the highest possible success rate for any data recovery case. This is usually the best option if the situation is severe and the data is critical or time sensitive. However, this is usually also the most costly of the three options provided.


Hopefully this has provided you with some insights and will assist you in making a well informed and wise decision, if you ever need to recover data from a failed smart phone, hard drive, or other digital storage device.



Cellebrite Forensic Software

Cellebrite Forensic Software

Cellebrite is an Israeli based mobile synchronization company headquartered at Petah Tikva. While Cellebrite has two business divisions namely Cellebrite Wireless Carriers and Cellebrite Mobile Forensics, it is the latter that we are going to look at in this article.

Cellebrite Forensic Software is one of the products produced by the Cellebrite Company for the purposes of helping the police with legal investigation. Since its establishment in 2007, the military branches, local law enforcement, federal state, corporate security and investigations like the law firms have been the main beneficiaries.

What can the Cellebrite Forensic Software Do?

According to its manufacturer, the software has the ability to perform the following functions on mobile phones and other hand held devices:

l Can recover deleted data on mobile phones

l Decipher encrypted information

l Retrieve protected information on mobile phones

l Analyze phone book contacts

l Decrypt messages and other multimedia content

How does the software work?

To begin with, the software works in a device known as Universal Forensic Extraction Device (UFED). Mostly, this is a hand-held device but the holder has an option of having the software on his desktop, data cables and adapters amongst other possible peripherals. In addition to that, it has SIM reader.

Using the device is simple. When a police officer or any other authorized personnel connect the device to the mobile phone of the suspect, the device displays the following options:

l Extract Phone Data: as its name suggests, this option allows the officer to directly acquire information from the suspects mobile phone

l Extract SIM/USIM Data: this involves getting information from the suspect’s SIM card directly

l Clone SIM ID: this feature allows the officer to make a copy of the suspect’s SIM card for the purposes of analyzing the information on the phone without necessarily having to pick the incoming calls.

l Memory Dump Beta: this feature allows the officer to disable passwords or any other form of encryptions for the purposes of obtaining information.

l Services: this is mainly for the device’s software upgrade and other administrative tasks.

With the growth of technology, sometimes there is no need for the physical connection between the suspect’s mobile phone and the UFED. The officer can choose to make the connection using the Bluetooth, data analysis and passwords feature. This only requires Bluetooth connectivity and the officer can access all the services available in the UFED.

Is the Cellebrite Forensic Software a success?

According to its manufacturer, the software is a success. For instance, since it was established (2007), the software helped in forensics by extracting data for as many as 8200 devices. The devices includes smartphones, PDA devices, mobile phones and tablet computers amongst others.

Due to its achievement, UFED became the hardware tool of the year for four consecutive years.


Cellebrite forensic software is a software developed by the Cellebrite Company located in Israel for the purposes of helping with forensic investigations. Since its establishment, UFED has been a success and has helped get information from over 8200 devices as of 2012. The software can therefore be termed as a success as it continues to better with the growth in technology.





Cyber risk: The Top Cyber Security Threats

2016 was a dangerous year for technology giants as their cyber security was compromised at their user’s expense. With organizations like Yahoo and Sony under the attack by cyber criminals, the world finally gave cyber security more than just a thought.


There is enough proof to say that 2017 will be no better than 2016. In fact, the attacks will not only increase in number but will also get worse for the organizations and individuals involved. Here are some of the recent cyber security threats that the world is facing.


The Top Cyber Security Threats


Ransomware is getting bigger

The start of 2017 saw one of the biggest ransomwares of all time. WannaCry affected millions of individuals and disrupted the working of many organizations including the government held offices of many countries in Asia. The hackers are getting more experimental, willing to try newer and foolproof technologies to hide their tracks and affect a larger population.

Politically driven sabotage has taken over economic espionage

The hackers are no more interested in gaining money by leaking the secret information of the organizations to their rivals. A new term called “hackivists” has emerged, where the hackers are driven towards their political and social causes and target the government rather than the corporations. This year, the Democratic Party of the USA saw a lot of it information getting leaked online opening up many controversies and subsequently, disrupting their election campaigns.

Banks need to be more cautious than ever

None of the recent bank robberies happened in physical time. All of them were conducted online, draining the bank of all the money it had in a matter of minutes. Gangs like Odinaff were involved in many of them. However, a few countries were also suspected to be involved in some of these heists.

Email has become more vulnerable

The electronic form of mail now has more users than ever, making it an easy spot for hackers to target. The number of emails containing malware were the highest in the past 5 years, with one in every 131 mails containing the malicious program. The method has mostly been used to target business organizations and has drained them out of over $3 billion in the past few years.

Cloud isn’t that safe anymore

As the cloud infrastructure is gaining more popularity among the businesses, the hackers are finding more ways to exploit it. The databases of many companies have been locked in the past due to lack of latest versions or good authentication practices in place. If you are investing in cloud, you need to invest in the right security practices to protect yourself.


Which cyber security threat are you most wary about? Let us know.