Google Voice is a popular phone and messaging service that gives Google account users US phone numbers. These are numbers that…
Comments closedBlog | DigForCE Lab Posts
Overview Starting on February 24th, 2025, William Campbell and Reina Girouard of the DigForCE Lab began an analysis and investigation into the key areas surrounding…
Comments closedRecently Apple released iOS 18 with a new feature that causes iPhones to reboot if they have been inactive for 72 hours (3 days). Specifically,…
Comments closedDisclaimer This post is dedicated to Ethical Hacking and legal Penetration Testing. All information is for educational use only. Never attempt to use these techniques…
Comments closedDisclaimer This post is dedicated to Ethical Hacking and legal Penetration Testing. All information is for educational use only. Never attempt to use these techniques…
Comments closedpreviously published in the Summer/Spring 2024 issue of Dakota Digital Review, published by the North Dakota University System https://dda.ndus.edu/ddreview/ By ARICA KULM, PHD Director of Digital…
Comments closedpreviously published in the Fall/Winter 2023 issue of Dakota Digital published by the North Dakota University System https://dda.ndus.edu/ddreview/ By ARICA KULM, PHD Director of Digital Forensics…
Comments closedIn securing a network, printers and related Internet of Things (IoT) devices are often overlooked, despite its commodity in offices and homes. Printers are seldom…
Comments closedWhen removing data from a storage device, such as a USB or hard disk drive, it is important to consider the method in which the…
Comments closedIntroduction When a phone is collected as evidence, it is important to consider various procedures to ensure that the maximum amount of information can…
Comments closed