Digital Forensics: Insight into SalvationDATA Certified Training Program 2018!
[Products Launch] Boost Your Imaging Speed With SalvationDATA New Generation Forensic Hardware: DCK 2 and Write-Blocker
[Pre-Sale] VIP 2.0: Special Offer of the Best-Selling DVR Forensics Tool of SalvationDATA
[Technical Article] SalvationDATA (DRS)Data Recovery System Case Study
How to remove password of encrypted Seagate drive by DRS?
[News] How Your Data Get Stolen from a Locked iPhone?
Could an iPhone guarantee the security of our personal data? We are likely to think that our data is well guarded with passwords and TOUCH-ID. Well, the truth is nothing is safe in hackers' hands.
[News] DRS and VIP Draw High Attention from Global Police
The Cyber Crime Investigators Workshop with Haryana Police recently took place at Faridabad police station in October 2016. This workshop of cyber crime & cyber law for Faridabad polices was led by famous cyber security expert Mr. Anuj Agarwal.
[News] CFTT(Agency Supported by NIST) Admitted SalvationDATA Data Recovery System to its Catalog
The SalvationDATA's fifth generation data recovery system DRS has passed America Computer Forensics Tool Test and is qualified to be listed on their catalog. SalvationDATA's DRS has been added in four main catalogs of CFTT as deleted file recovery, disk imaging,file carving, and forensic tool suite. Now you can check out SalvationDATA DRS on the CFTT website.
[Event] SalvationDATA Presents at Western China International Fair
Unveiled on Nov 3rd at Chengdu Century City New International Convention and Exhibition Center, the 16th Western China International Fair attracted over 60,000 visitors from 91 countries around the world.
[News] SalvationDATA and Delegates from Pakistan Exchanged Notes on Digital Forensics
On Oct 18th, SalvationDATA and delegates from Pakistan held talk on development and cooperation of digital forensics.
[Technical Article] (DRS)Data Recovery System Disk Imaging Function Demonstration
As normal hard drives without bad sectors doesn't involve skipping bad sectors while imaging, we can choose the relatively fast and simple approach, i.e. Quick Image function.And the specific operation of this function is demonstrated as below.
SalvationDATA Presents at Western China International Fair
Unveiled on Nov 3rd at Chengdu Century City New International Convention and Exhibition Center, the 16th Western China International Fair attracted over 60,000 visitors from 91 countries around the world. At the exhibition, SalvationDATA showed its Data Recovery System(DRS), SmartPhone Forensic System(SPF) and Video Investigation Portable(VIP). And as a hi-tech company with 15 years’ experience in digital forensics and over 300 patents, products presented by SalvationDATA captured attention of plenty of visitors. During the exhibition, SalvationDATA was also invited to EU-China Green Economy Development Forum and EU-China Business&Technology Cooperation Fair. As a pioneer of the industry, SalvationDATA is always committed to providing innovation platform with proprietary technologies for Law Enforcement Agencies, Government , Military Intelligence Agencies, Digital Forensics Laboratories and Corporations, etc. And SalvationDATA’s thanks go out to
DRS Disk Imaging Function Demo
How Your Data Get Stolen from a Locked iPhone?
Could an iPhone guarantee the security of our personal data? We are likely to think that our data is well guarded with passwords and TOUCH-ID. Well, the truth is nothing is safe in hackers’ hands. Here’s how your valuable data get stolen when your iPhone falls into a hacker’s hands. 1. When your iPhone is obtained by a hacker, SIM card will be pulled out immediately and inserted into another iPhone. As most of us do not have the habit of setting PIN code for SIM card, our phone number can be acquired with ease.2. Most of iPhones are configured to receive notifications with message details while iPhone is locked. So if it happens that the owner of the lost iPhone is in a group chat, name and phone number will be displayed when a notification pops up. The hacker can then get the name of the owner just by sending a short message in the group. 3. The next step? Obtain your Gmail address with your phone number and name. 4. Now the hacker get enough personal information, the password of