by Zakir Shah | Feb 14, 2025 | Blog, Collection, Computer Investigations, eDiscovery collections, Mobile Data Collection
As digital forensics and eDiscovery professionals know, collecting data from smartphones grows more challenging with evolving encryption technologies. The latest Samsung Galaxy and Android updates have introduced a new encryption format for SMS, MMS and RCS messages,...
by admin-jon | Feb 13, 2025 | Blog, Collection, Computer Investigations, eDiscovery collections, IOS iPhone Collection, Mobile Data Collection
With the release of iOS 18, Apple has introduced Rich Communication Services (RCS) messaging support, a long-anticipated shift that modernizes text messaging for iPhone users. While this update improves messaging interoperability with Android devices, it presents new...
by admin-jon | Oct 4, 2019 | Cloud-based E-Discovery, Collection, Computer Investigations, eDiscovery collections, Electronic Discovery, Electronic Discovery Collection, ESI Collection, ESI Software, SharePoint Collection Tool, Uncategorized
Pinpoint Labs develops defensible eDiscovery collection software. Pinpoint Labs software collects local, remote, network computers and popular cloud accounts. USE CASE EXPLANATIONS #1 Targeted, Remote Self-Collections Companies and firms performing...
by admin-jon | Feb 27, 2019 | Collection, Computer Investigations, Electronic Discovery, Electronic Discovery Collection, ESI Collection, ESI Software, Preservation
Merge Harvester E-Discovery collections into a central review database with just a few clicks! This is the 4th of 8 sneak peeks into the features in our upcoming Harvester 6.0 release. SNEAK PEEK #4 – MERGE, PROCESS, OCR AND REVIEW When self-collection kits are...
by admin-jon | Jan 3, 2019 | Computer Investigations, Electronic Discovery, Electronic Discovery Collection, ESI Collection, ESI Software, Preservation
New Harvester macOS agent provides data assessment and collection from Mac clients This is the 3rd of 8 sneak peeks into the features in our upcoming Harvester 6.0 release. SNEAK PEEK #3 – COLLECT FROM ALL YOUR PC’S WITH HARVESTER SERVER Many E-Discovery...
by admin-jon | Dec 10, 2010 | Blog, Collection, Computer Investigations, Definition, Electronic Discovery, ESI Software, Preservation, Tips & Tricks
A hash value results from a calculation (hash algorithm) that can be performed on a string of text, electronic file, or entire hard drive contents. The result is also called a checksum, hash code, or hashes. Hash values are used to identify and filter duplicate files...