Capabilities and Services
- Incident Response
- Forensic Acquisition and Analysis of Data
- Expert Witness Services
- Interview Support
- Brand Protection & website take-down
- Data Recovery
- Malware Reverse Engineering
- Forensic Readiness Planning
- First Responder Training
- Covert On-Site Analysis & Investigation
Microsoft *finally* disables USB Autorun (23-September 2013)
Microsoft has rolled-out an ‘important, non-security update’ through Windows Update. The update changes…
iPhone 5S fingerprint sensor hacked (23-September 2013)
The biometrics team of Germany’s well-known Chaos Computer Club claims it has “cracked”…
NSA allegedly spied on UN offices and EU embassies (31-August 2013)
The latest revelations from Edward Snowden, which were published in the German magazine…
New York Times domain hijack due to phishing email (31-August 2013)
On Wednesday evening hackers claiming to be part of the Syrian Electronic Army…
Men charged with stealing source code from Wall Street firm (31-August 2013)
Three men have been charged in a scheme to steal the source code…
Secure Google Docs phishing email (29-August 2013)
Details have emerged to day of a spate of phishing attacks targeting Gmail…
Major cyber-security breaches (27-August 2013)
A wonderful graph showing all the major cyber-security system breaches (major, means more…
End of Windows XP support may encourage hackers (14-August 2013)
When Windows XP Support expires next spring, flaws may fetch high prices. In…
Computer Forensics London
Computer forensics is the process of analysing the data stored on computers and other electronic devices to discover precisely what has been going on. Whether that involves deleted email, copying of sensitive information or accessing inappropriate material, modern devices record a staggering amount of data, which when examined correctly by a suitably trained computer forensic analyst can provide a compelling narrative in support of an investigation or litigation.
Increasingly, computer forensics is used to determine who is responsible for data network intrustions and intellectual property theft. This may include analysis of malicious code and examination of various network devices to discover the identity of the attacker and what data has been exfiltrated. The output of the computer forensic process is a technical report, which should set out in clear plain English exactly what has occurred and be presented in a format that will be admissible as evidence in court should legal remedies be sought.
Digital Forensics Company
First Response encompasses the digital forensic activities of Business Efficiency (founded in 1986 by Bill Lindley) Fleet Forensics (founded in 2008 by Ray Massie) and LangfordParc (founded in 2011 by John Douglas). We carry out both covert and non-covert operations for a wide variety of clients including banks, law firms, energy companies and public sector bodies. Client affairs are treated with strict confidence and as such we don’t publish past client lists, but if you need to discuss our capabilities and costs, we are happy to speak with you on 020 7193 4905. Call us today.
Our computer forensic company is based London. We are well placed to deal with clients both in the UK and abroad through our carefully selected associates who include some of the most experienced and best regarded analysts in UK digital forensics investigations.
We’re completely client-focused and able to react to client requirements at very short notice. No organisation can guarantee to find the data you are looking for but if it exists, First Response will find it. Our computer investigators all have at least seven years of computer forensic experience and follow the Association of Chief Police Officers’ Guidelines for dealing with electronic evidence in identifying, collecting, preserving and analysing digitally stored data, ensuring that our clients are armed with the highest quality, admissible evidence. We are proud to list our principals and key associates.