Mobile Forensics

Mobile Forensics

The ability to keep in touch with family, business associates, and to access emails are only a few of the reasons for the increasing importance of mobile phones. Today’s technically advanced cell phones are capable of receiving and placing phone calls, storing data, taking pictures, to name just a few of the numerous functions.

READ MORE…

Computer Forensics

Computer Forensics

Computer Forensics is the preservation, identification, extraction, interpretation, and documentation of computer evidence to include the legal processes, the integrity of evidence, factual reporting of the information found, and the ability to provide an expert opinion in a court of law or other legal proceedings with regards to the findings.

READ MORE…

Network Forensics

Network Forensics

Network Forensics is the capture, recording, storage and analysis of network events to discover the source of security attacks or other problem incidents. The purpose of Network forensics is to record every packet of network traffic to a single searchable repository to examine the traffic in great detail.

READ MORE…

Vulnerability Assessment

Vulnerability Assessment

Due to the growing nature of the Information Security and Cyber Crime threats, Dynamdre focuses on an Information Security Risk and Vulnerability Management approach that delivers results based on indisputable Information Security Risks and Vulnerabilities, and not just on best practice audits.

READ MORE…

Penetration Testing

Penetration Testing

Penetration testing or ethical hacking is the process of evaluating a company’s ICT security and incident response systems to determine if there are any exploitable vulnerabilities which can be used harm to the organisation or its reputation.

READ MORE…