Capabilities and Services
- Incident Response
- Forensic Acquisition and Analysis of Data
- Expert Witness Services
- Interview Support
- Brand Protection & website take-down
- Data Recovery
- Malware Reverse Engineering
- Forensic Readiness Planning
- First Responder Training
- Covert On-Site Analysis & Investigation
Open Source Project Aims to Provide Encryption for Communications (17-September 2014)
An open source project aimed at providing easy-to-use encryption for email launched on…
Hospital CIO Shares How They Fought Attacks From Anonymous (17-September 2014)
Boston Children’s Hospital senior vice president for information services and CIO Dr. Daniel…
New Zealand ISP Outage Blamed on Poorly-Configured Modems and DDoS (9-September 2014)
New Zealand Internet service provider (ISP) Spark says that service outages over the…
Windows Cyber Espionage Malware Ported to Mac (9-September 2014)
A variant of back-door malware used to infect systems with advanced persistent threats…
CryptoWall More Prolific Than CryptoLocker (4-September 2014)
Analysis from Dell SecureWorks Counter Threat Unit shows that CryptoWall ransomware has passed…
Syrian Malware Team Using BlackWorm Remote Access Trojan (4-September 2014)
The Syrian Malware team, a group with alleged ties to the Syrian Electric…
Phishing Attack Targets Norwegian Oil and Gas Industry (4-September 2014)
Norway’s oil and gas industry has been targeted in a coordinated attack that…
Watering Hole Attack Targets Industrial Software Company Website Visitors (4-September 2014)
A watering hole attack on the website of an unnamed industrial software company…
Computer Forensics London
Computer forensics is the process of analysing the data stored on computers and other electronic devices to discover precisely what has been going on. Whether that involves deleted email, copying of sensitive information or accessing inappropriate material, modern devices record a staggering amount of data, which when examined correctly by a suitably trained computer forensic analyst can provide a compelling narrative in support of an investigation or litigation.
Increasingly, computer forensics is used to determine who is responsible for data network intrustions and intellectual property theft. This may include analysis of malicious code and examination of various network devices to discover the identity of the attacker and what data has been exfiltrated. The output of the computer forensic process is a technical report, which should set out in clear plain English exactly what has occurred and be presented in a format that will be admissible as evidence in court should legal remedies be sought.
Digital Forensics Company
First Response encompasses the digital forensic activities of Business Efficiency (founded in 1986 by Bill Lindley) Fleet Forensics (founded in 2008 by Ray Massie) and LangfordParc (founded in 2011 by John Douglas). We carry out both covert and non-covert operations for a wide variety of clients including banks, law firms, energy companies and public sector bodies. Client affairs are treated with strict confidence and as such we don’t publish past client lists, but if you need to discuss our capabilities and costs, we are happy to speak with you on 020 7193 4905. Call us today.
Our computer forensic company is based in London. We are well placed to deal with clients both in the UK and abroad through our carefully selected associates who include some of the most experienced and best regarded analysts in UK digital forensics investigations.
We’re completely client-focused and able to react to client requirements at very short notice. No organisation can guarantee to find the data you are looking for but if it exists, First Response will find it. Our computer investigators all have at least seven years of computer forensic experience and follow the Association of Chief Police Officers’ Guidelines for dealing with electronic evidence in identifying, collecting, preserving and analysing digitally stored data, ensuring that our clients are armed with the highest quality, admissible evidence. We are proud to list our principals and key associates.