Computer Forensics

Kroll's computer forensics experts ensure that no digital evidence is overlooked and assist at any stage of an investigation or litigation, regardless of the number or location of data sources.

Contact us
/en/services/cyber-risk/incident-response-litigation-support/computer-forensics service

Claims of fraud, financial tampering, computer crime, employee misconduct, and other wrongdoing require corporations, law firms, and government agencies to follow digital trails to piece together facts that lead to the truth.

Trust Kroll computer forensics experts to assist you with your most complex and sensitive investigative or litigation matters involving electronic evidence or data preservation.

 

Complete Coverage

Kroll’s computer forensics experts help ensure no digital evidence is overlooked and assist at any stage of a digital forensics investigation or litigation, regardless of the number or location of data sources.

Cyber Crime Investigation

We examine physical and digital evidence to uncover what did or did not happen, using Kroll's combination of computer forensic expertise and traditional investigative techniques.

Data Preservation

In the event of an investigation or litigation, Kroll offers cost-effective and defensible methodologies and solutions to identify and preserve electronic data.

Data Collection

Regardless of the volume and complexity of your collection needs, our team deploys forensically sound, best-practice methodology to gather your data for electronic investigation and forensic analysis, or forensic discovery.

Data Recovery and Forensic Analysis

Whether data was deleted or manipulated on purpose or by accident, Kroll's digital forensics experts analyze the digital clues left behind to quickly and defensibly uncover critical information.

Expert Testimony and Reporting

Our experts have the necessary experience and credentials to creditably serve as an expert witness or special master.

Increased Cyber Resilience with a Cyber Risk Retainer

Kroll delivers more than a typical incident response retainer—secure a true cyber risk retainer with elite digital forensics and incident response capabilities and maximum flexibility for proactive and notification services.

Connect with us

Jason N Smolanoff
Jason N. Smolanoff
President, Cyber Risk
Cyber Risk
Los Angeles
Phone
Benedetto Demonte
Benedetto Demonte
Chief Operating Officer, Cyber Risk
Cyber Risk
New York
Phone
Devon Ackerman
Devon Ackerman
Regional Managing Director, North America
Cyber Risk
New York
Phone
Marc Brawner
Marc Brawner
Managing Director and Global Head of Managed Services
Cyber Risk
Nashville
Phone

See all servicesStay Ahead with Kroll

Valuation

Valuation of businesses, assets and alternative investments for financial reporting, tax and other purposes.

Compliance and Regulation

End-to-end governance, advisory and monitorship solutions to detect, mitigate and remediate security, legal, compliance and regulatory risk.

Corporate Finance and Restructuring

Comprehensive investment banking, corporate finance, restructuring and insolvency services to investors, asset managers, companies and lenders.

Cyber Risk

Incident response, digital forensics, breach notification, managed detection services, penetration testing, cyber assessments and advisory.

Environmental, Social and Governance

Advisory and technology solutions, including policies and procedures, screening and due diligence, disclosures and reporting and investigations, value creation, and monitoring.

Investigations and Disputes

World-wide expert services and tech-enabled advisory through all stages of diligence, forensic investigation, litigation and testimony.

Business Services

Expert provider of complex administrative solutions for capital events globally. Our services include claims and noticing administration, debt restructuring and liability management services, agency and trustee services and more.

The Monitor


The Rise of Vishing and Smishing Attacks – The Monitor, Issue 21

Aug 02, 2022

by Laurie Iacono Josh Hickman, Caitlin Muniz

Cyber


New MFA Bypass Phishing Method Uses WebView2 Applications with Hidden Keylogger

Jul 28, 2022

by Scott Hanson Mikesh Nagar, George Glass

Cyber


Q4 2021 Threat Landscape: Software Exploits Abound

Feb 16, 2022

by Keith WojcieszekLaurie Iacono George Glass

Cyber


CVE-2021-43702 from Discovery to Patch: ASUS Modem/Router Device Takeover Vulnerability

Jun 21, 2022

by Luke Walker

Cyber


Bumblebee Loader Linked to Conti and Used In Quantum Locker Attacks

Jun 06, 2022

by George Glass

Cyber


ModPipe POS Malware: New Hooking Targets Extract Card Data

Jun 02, 2022

by Sean Straw

Webcast


Webcast Replay – Q1 2022 – Threat Landscape Virtual Briefing: Threat Actors Target Email for Access and Extortion

May 18, 2022

Cyber


MFA Prompt Bombing No More: Countering MFA Bypass Tactics

May 23, 2022

by Devon AckermanPierson ClairDavid Wagner Joshua Karanouh-Schuler

News


Kroll Expands Cyber Incident Recovery Services

May 26, 2022

News


Kroll Partners with Armis to Extend Preparedness and Response for OT and ICS Environments

May 09, 2022

News


Kroll Responder Recognized in 2021 Gartner Market Guide for Managed Detection and Response Services

Nov 19, 2021

News


Op-Ed: The Australian Cyber Threat Landscape Today and How to Look Ahead

Jul 09, 2021

Webcast


KAPE Intensive Training and Certification

Online Event Apr 12 - Dec 08, 2022 | Online Event