800-849-6515 24/7/365 Support Service Open

Digital Forensics Corporation

Where discovery meets evidence

data breach services video
What makes us different

Get Help

with just a few clicks

Response within 10 minutes

Unlock Your Digital Evidence

GSA Approved Forensics Specialist

What sets us aPART

Digital Forensics Corp has proven success working with Fortune 500 companies across industries to handle data breach incidents.

Experience across the USA and Canada

With locations across North America, our digital forensics experts are near and ready to help. We are able to work on your case remotely, in-lab and onsite. Contact us or submit a case today to learn more about how we can help you.

Secure Process

Annual SSAE 16 Type III SOC and internal HIPAA compliance audits to assure complete confidentiality with a wide range of security & confidentiality standards.

Leading Experts

The DFC team is comprised of forensic investigators, certified fraud examiners, former law enforcement officials, certified digital forensic examiners , data analysts, and system and network domain experts.

Contact us for analysis and quote

We offer immediate, 24/7 assistance from our team of digital investigators.

Trusted Experts

Watch videos of our featured services

data breach services video
Watch video to understand important first steps to contain a data breach
disgruntled employees video
Watch video to learn how to handle disgruntled employees
ip theft investigation services video
Watch video to learn how to address intellectual property theft.

Recent Blog Posts.

WannaCry may be ported for Windows 10

Rene Milman wrote an article about how the latest Microsoft operating system could be infected with ransomware. Malicious can on TCP scan 445 port (Server Message Block / SMB) and spread like a worm, attacking hosts and encrypting the files that are on them. After that, he wants to list some number of bitcoyans for decryption.   ...

Read more...

PcapDB Overview

PcapDB is a packet capture system designed to optimize the captured data for fast search in the typical (network incident response) use case. A PcapDB installation consists of a Search Head and one or more Capture Nodes. The Search Head can also be a Capture Node, or it can be a VM somewhere else. The first requirement is that PcapDB is designed to...

Read more...

Reverse Engineering: Windows Internals

Reverse engineering of malware runs on Windows systems, since the Windows system still accounts for more than 90% of all computing systems in the world. Due to the fact that more than 90% of malicious programs are designed to compromise the Windows system, we will focus on Windows operating systems. To understand how malicious programs can use and ...

Read more...

Back to Top