slideshow 1 slideshow 2 slideshow 3

WestNet Computer Forensics and Network Security Professionals in Los Angeles

WestNet provides Electronic Discovery (eDiscovery), Data Recovery, Expert Witness as well as Network Security and PCI Compliance Assessment Services.

At WestNet Forensic Services we can help you secure your critical digital assets. We can identify your IT security risks, exposures and vulnerabilities to cyber threats such as viruses, Trojans, and hackers. If you're looking for an external security analysis, penetration test, or a security assessment, we will help!
PCI Compliance

WestNet Computer Forensics has expertise with all types of cases where electronic stored information needs to be recovered, processed and analyzed. We are based in Burbank and Service Los Angeles and Orange County Area.

WestNet works with all types of businesses including individuals, small businesses, law firms, government agencies and fortune 500 companies in assistance with electronic data discovery.


We Provide IT Investigation, Computer Forensic, Security Audit and Litigation Support Services

As is often the case with security compromises, it's not a matter of if your company will be compromises, but when.
Computer forensics is the preservation, identification, extraction, interpretation , and documentation of computer evidence. Often digital forensics is referred to as "the scientific acquisition, analysis, and preservation of data contained in electronic media whose information can be used as evidence in a court of law."
Cyber activity has become an important part of the every day lives of the general public. According to the EC-Council, eighty-five percent of businesses and government agencies have detected a security breach. The Examination of digital evidence has provided a medium for forensic investigators to focus on after an incident has occurred. The ultimate goal of a computer forensic investigator is to determine the nature and events concerning the crime and to locate the perpetrator by following a structured investigative procedure.

Computer Forensic Flaws and Risks

Computer forensics is in its developmental stage. It differs from other forensic sciences as digital evidence is examined. There is a little theoretical knowledge to base assumptions for analysis and standard empirical hypothesis testing when carried out lacks proper training or standardization of tools, and lastly it is still more "art" than Science.

Forensic Service Tech

Recent Blog Posts



Cybercrime Comes to the IMF

The International Monetary Fund disclosed this weekend that it recently was the victim of a cyberattack. This comes hard on the heels of Google's revelation that a relatively sophisticated attack tried to compromise email accounts of high-profile American policy makers, and a security breach at RSA, a company that manufactures security devices used by hundreds of thousands of employees at thousands of companies to access sensitive information on corporate computer networks.



Computer viruses set to be criminalized under new law

Makers and distributors of computer viruses will be subject to criminal prosecution under a bill to revise the Criminal Code and other relevant laws that is expected to pass the current Diet.

The bill passed the House of Representatives on May 31 and was sent to the House of Councillors later the same day.

Presently there is no law directly criminalizing the creation or distribution of computer viruses, making it difficult for investigative authorities to combat cybercrimes.



The FBI Is Losing the War on Cybercrime

One in four hackers in the U.S. is an FBI informant, the UK Guardian reported today. They must be doing a pretty bad job, because cybercrime seems to be spiking like crazy, and the Federal Bureau of Investigation itself has even been targeted. Today, the new hacking collective Lulz Security released what it said was the source code for the Sony Computer Entertainment Development Network (its fifth hack of Sony).



New Gadget Recovers Deleted Data from Androids

Paraben Corporation (http://www.paraben.com/), a leader in the digital forensics industry, announced the release of the Phone Recovery Stick. This innovative new product brings advanced computer forensic powers to every day consumers. Until now, people would need to pay forensic examiners to try to extract deleted data from Androids. The Phone Recovery Stick gives this power to anyone who can plug the USB device into a computer. Once plugged in, users simply plug their Android phone in and run the program.



Sony Pictures confirms LulzSec hacker attack, FBI probe

Culver City-based Sony Pictures Entertainment Inc., the television and movie studio for the Japanese electronics giant, confirmed late Friday that it been hacked and was working with the FBI to identify the attacker.

In a statement, the studio's chairman Michael Lynton and co-chairman Amy Pascal said that a "cyber-crime wave that has affected Sony companies and a number of government agencies, businesses and individuals in recent months has hit Sony Pictures as well."



Hackers hit Atlanta FBI affiliate

The FBI announced Sunday it shut down an Atlanta-based website that tracks cyber-crime after the site was compromised by a mysterious, yet increasingly audacious group of hackers.

InfraGard Atlanta, a nonprofit partnership between local business, government and academic security experts and the FBI, was hacked late last week by Lulz Security. LulzSec, as it’s known on-line in cyber security channels, hijacked the InfraGard site and published the email addresses, usernames and passwords of its 180 members.



Cyber Crimes Task Force Uses Technology to Catch Predators

BENTON, Mo. -- Pedophilia was around long before computers were invented.
But "the Internet is what brought it to the forefront," said Det. Scott Phelps, investigations coordinator for the Southeast Missouri Cyber Crimes Task Force.

Before there were online chat rooms, predators had to physically approach children, often in public places, to lure them away from safety. Before digital images could be sent through email or downloaded from websites, child pornography collectors exchanged paper photographs and film reels.

Pages

Copyright WestNet Consulting Services, Inc. 2011.Computer Forensic Company: Sitemap