Learn more about Tic Tac with our new 3′ corporate video.

Private Control of Electronic Crime

ONLINE FRAUD

The digital world is no different than the real world.

Therefore, just as in everyday life you take the necessary measures to feel safe, the same goes for the online world and you must be always prepared for threats.

Online Apates

Online Fraud:
The Plague of 2020 – 2030

Protect your personal data, passwords and your money! Gain an ally against malicious actions and fraud, which are aggressively growing every year

Online Apates
Logos

Electronic Evidence Collection

The Electronic Research of a crime differs significantly from “traditional research” looking for tangible evidence. The electronic researcher is not looking in a drawer or in some space but in electronic folders, files, storage devices, computing systems.

The digital evidence collected are considered particularly sensitive.Therefore, important piece of electronic research is to preserve them and ensure non-alteration.

The eResearch of a crime must be conducted in accordance with existing law, as many doubts are raised about the adequacy of knowledge of the researcher and whether the analysis and preservation of data follow the procedures.Therefore, many times, we face the phenomenon in a trial to dispute either the investigation, or to confiscate the information because there is no specific legislative framework in the case of research in cyberspace.

During an investigation, it is important to not violate the privacy of individuals. Therefore generally it requires a warrant which should specify precisely the objects that can be searched and even if the researcher believes he could draw data from other than these items, these items do not have probative value to the courtroom .

Ti Einai Psifiaka Peistiria

Computer forensics – evidence collection process

  • Identification of means of data recording and photographing in order to be able to demonstrate the natural environment and condition of items.
  • Creation of security areas for data.Usually a secure cabinet is used.
  • List of items that may include: laptop computers, hard disk or external drives, backup recording media, DVD, CD, etc., keys USB, pocket PCs, smart phones, analysis of network activities.
  • Creation of a folder for forensic evidence which can not be deleted or removed to ensure data integrity.
  • Registration and insurance of the electronic image of the forensic data disk and labor on the working image of the disk by the researcher.
  • Search for other sources of data extraction, as indicated by the progress of the case.
  • Examination of the data with appropriate software to make the searched data readable and usage of keywords to identify data relevant to the case.
  • Aggravating and non data are collected, files are decrypted and security codes get broken.
  • Afterwards a report is recorded with each stage of electronic forensic research findings, signed by the customer.
  • If considered necessary, the investigator shall attend as a witness in the courtroom.
Exemythia Idiotikotita
Aegean White
Alpha Bank White
Dei White
Eurobank White
Ote White
Revoil White
Alpha White
Dell White
Media Markt White
Plaisio White
Shell White
Siemens White
Toshiba White
Wind
We create the process We offer the technology We educate people

Representatives of the biggest Cyber Security companies

Guaranteed protection solutions from one of the most reliable companies in the field.

Acronis
Brand Shield
Digimune
Microsoft Partner
Deep Instict
Comodo
Security Scoreboard

Computer Forensics for Individuals

  • Do you suspect that your spouse is cheating on you?
  • Worried about the activities of your children on the internet or their telephone conversations?
  • Do you have litigation in family and inheritance issues?

When you have a dispute that is going to take the path of justice, please contact TicTac Laboratories to pump data from any computer or mobile phone, as evidence of your divorce, research on mobile phone to identify extinct calls and Deleted messages hidden documents and images switched off.

 Our company works in close cooperation with you, under the forthcoming legislation on protection of personal data and respecting the obligation to protect individual rights and only if you have the legal right to access to computer and electronic means of others that have “raised” you in some way or have something to hide from you. So :

  • Do you suspect that your spouse is cheating on you?
  • Are you recently divorced and you receive threats and feel observed by your former husband / spouse?
  • Do you think we can help in identifying evidence through research on cell phone e-mails, photos, sms and calls that have ‘disappeared‘
  • Do you accept electronic attack and you feel that you are constantly under surveillance
  • Did you notice financial transactions for which you never gave your command
  • Your passwords have been violated and you found out that your money from your bank account have vanished
  • Are you concerned about your child and think that makes misuse of the Internet, browsing web pages prohibitive for the age of content
  • Do you suspect that pornographic sites are often visited by a member of your family and want to cancel this feature
  • You are coheir, but have doubts about the integrity of the will and wish to check the online records of the deceased

Contact directly to TicTac Laboratories, to give you immediate professional solution, drawing files and data such as documents, messages, photos, and Deleted discussions of all forms of electronic communication by phone, hard drive, laptop or usb flash that you deliver for examination.

You can request the immediate assistance of our technicians either as service at home or by handing them the hard drive or mobile phone for example. from which you think you can be get evidence to present to the appropriate courtroom.

The cost for such a process starts from 250 € + VAT and depends on several factors. Contact us by describing your case for more information.

Banner