Hacker Factor

Home Blog Services Software Presentations Publications About Contact


There are many different types of computer security consultants. There are consultants who will:
  • Advise you of common risks and mitigation options.

  • Design and architect a secure-enough solution that matches your needs.

  • Audit your system and tell you what needs to be improved.

  • Come in after you have been compromised and tell you how it was done.
We not only do that, but we go one step further. At Hacker Factor, we profile the attackers. Were you targeted at random or was the attack specific for you? How many people were involved? What are their skill sets? Where are they from? Did they get what they wanted, or will they be back?

As with conventional forensics, in computer forensics there is the Locard Principle: Every contact leaves a trace. Everything you type, every file you open, every picture you create, and every packet you send says something about you. At Hacker Factor, we develop cutting edge forensic technologies and methods for extracting trace evidence from computer systems, software, and files.